scispace - formally typeset
Open AccessJournal ArticleDOI

Practical device-independent quantum cryptography via entropy accumulation.

TLDR
A property of entropy, termed “entropy accumulation”, is presented, which asserts that the total amount of entropy of a large system is the sum of its parts, which is used to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters.
Abstract
Device-independent cryptography goes beyond conventional quantum cryptography by providing security that holds independently of the quality of the underlying physical devices. Device-independent protocols are based on the quantum phenomena of non-locality and the violation of Bell inequalities. This high level of security could so far only be established under conditions which are not achievable experimentally. Here we present a property of entropy, termed “entropy accumulation”, which asserts that the total amount of entropy of a large system is the sum of its parts. We use this property to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters. Recent experimental progress, which enabled loophole-free Bell tests, suggests that the achieved parameters are technologically accessible. Our work hence provides the theoretical groundwork for experimental demonstrations of device-independent cryptography.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Secure quantum key distribution with realistic devices

TL;DR: This review gives both sides of the story, with the current best theory of quantum security, and an extensive survey of what makes quantum cryptosystem safe in practice.
Journal ArticleDOI

Device-independent quantum secure direct communication against collective attacks

TL;DR: The first device-independent quantum secure direct communication protocol (DI-QSDC) is put forward and its security and communication efficiency against collective attacks are analyzed and noiseless linear amplification (NLA) protocol and entanglement purification protocol (EPP) are modified.
Journal ArticleDOI

Experimentally generated randomness certified by the impossibility of superluminal signals

TL;DR: 1,024 random bits that are uniformly distributed to within 10−12 and unpredictable assuming the impossibility of superluminal communication are generated and certified using a loophole-free Bell test and a protocol is described that is optimized for devices that are characterized by a low per-trial violation of Bell inequalities.
References
More filters
Journal ArticleDOI

On the Einstein-Podolsky-Rosen paradox

TL;DR: In this article, it was shown that even without such a separability or locality requirement, no hidden variable interpretation of quantum mechanics is possible and that such an interpretation has a grossly nonlocal structure, which is characteristic of any such theory which reproduces exactly the quantum mechanical predictions.
Journal ArticleDOI

Quantum cryptography based on Bell's theorem.

TL;DR: Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported, based on the Bohms version of the Einstein-Podolsky-Rosen gedanken experiment andBells theorem is used to test for eavesdropping.
Journal ArticleDOI

Proposed Experiment to Test Local Hidden Variable Theories.

TL;DR: In this paper, a theorem of Bell, proving that certain predictions of quantum mechanics are inconsistent with the entire family of local hidden-variable theories, is generalized so as to apply to realizable experiments.
Journal ArticleDOI

Quantum cryptography

TL;DR: A protocol for coin-tossing by exchange of quantum messages is presented, which is secure against traditional kinds of cheating, even by an opponent with unlimited computing power, but ironically can be subverted by use of a still subtler quantum phenomenon, the Einstein-Podolsky-Rosen paradox.
Related Papers (5)