Limits of privacy amplification against nonsignaling memory attacks

被引:20
作者
Arnon-Friedman, Rotem [1 ]
Ta-Shma, Amnon [1 ]
机构
[1] Tel Aviv Univ, Blavatnik Sch Comp Sci, IL-69978 Tel Aviv, Israel
来源
PHYSICAL REVIEW A | 2012年 / 86卷 / 06期
关键词
D O I
10.1103/PhysRevA.86.062333
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The task of privacy amplification, in which Alice holds some partially secret information with respect to an adversary Eve and wishes to distill it until it is completely secret, is known to be solvable almost optimally in both the classical and quantum worlds. Unfortunately, when considering an adversary who is limited only by nonsignaling constraints such a statement cannot be made in general. We here consider systems which violate the chained Bell inequality and prove that under the natural assumptions of a time-ordered nonsignaling system, which allow past subsystems to signal future subsystems (using the device's memory for example), superpolynomial privacy amplification by any hashing is impossible. This is of great relevance when considering practical device-independent key-distribution protocols which assume a superquantum adversary. DOI: 10.1103/PhysRevA.86.062333
引用
收藏
页数:9
相关论文
共 17 条
[1]   From Bell's theorem to secure quantum key distribution [J].
Acin, Antonio ;
Gisin, Nicolas ;
Masanes, Lluis .
PHYSICAL REVIEW LETTERS, 2006, 97 (12)
[2]   No signaling and quantum key distribution [J].
Barrett, J ;
Hardy, L ;
Kent, A .
PHYSICAL REVIEW LETTERS, 2005, 95 (01)
[3]  
Barrett J., ARXIV12090435
[4]   Maximally nonlocal and monogamous quantum correlations [J].
Barrett, Jonathan ;
Kent, Adrian ;
Pironio, Stefano .
PHYSICAL REVIEW LETTERS, 2006, 97 (17)
[5]  
Bell J. S., 1964, Physics, V1, P195, DOI [10.1103/physicsphysiquefizika.1.195, DOI 10.1103/PHYSICSPHYSIQUEFIZIKA.1.195, 10.1103/Physics-PhysiqueFizika.1.195]
[6]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[7]   WRINGING OUT BETTER BELL INEQUALITIES [J].
BRAUNSTEIN, SL ;
CAVES, CM .
ANNALS OF PHYSICS, 1990, 202 (01) :22-56
[8]   PROPOSED EXPERIMENT TO TEST LOCAL HIDDEN-VARIABLE THEORIES [J].
CLAUSER, JF ;
HORNE, MA ;
SHIMONY, A ;
HOLT, RA .
PHYSICAL REVIEW LETTERS, 1969, 23 (15) :880-&
[9]  
Friedman R. A., ARXIV12053736
[10]   Full-field implementation of a perfect eavesdropper on a quantum cryptography system [J].
Gerhardt, Ilja ;
Liu, Qin ;
Lamas-Linares, Anta ;
Skaar, Johannes ;
Kurtsiefer, Christian ;
Makarov, Vadim .
NATURE COMMUNICATIONS, 2011, 2