Linking classical and quantum key agreement: Is there "bound information"?

被引:0
作者
Gisin, N [1 ]
Wolf, S
机构
[1] Univ Geneva, Appl Phys Grp, CH-1211 Geneva, Switzerland
[2] Swiss Fed Inst Technol, Dept Comp Sci, CH-8092 Zurich, Switzerland
来源
ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS | 2000年 / 1880卷
关键词
secret-key agreement; intrinsic information; secret-key rate; quantum privacy amplification; purification; entanglement;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
After carrying out a protocol for quantum key agreement over a noisy quantum channel, the parties Alice and Bob must process the raw key in order to end up with identical keys about which the adversary has virtually no information. In principle, both classical and quantum protocols can be used for this processing. It is a natural question which type of protocols is more powerful. We show that the limits of tolerable noise are identical for classical and quantum protocols in many cases. More specifically, we prove that a quantum state between two parties is entangled if and only if the classical random variables resulting from optimal measurements provide some mutual classical information between the parties. In addition, we present evidence which strongly suggests that the potentials of classical and of quantum protocols are equal in every situation. An important consequence, in the purely classical regime, of such a correspondence would be the existence of a classical counterpart of so-called bound entanglement, namely "bound information" that cannot be used for generating a secret key by any protocol. This stands in sharp contrast to what was previously believed.
引用
收藏
页码:482 / 500
页数:19
相关论文
共 31 条
  • [1] [Anonymous], 1993, Quantum Theory: Concepts and Methods, Fundamental Theories of Physics
  • [2] Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography
    Bechmann-Pasquinucci, H
    Gisin, N
    [J]. PHYSICAL REVIEW A, 1999, 59 (06): : 4238 - 4248
  • [3] Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
  • [4] Purification of noisy entanglement and faithful teleportation via noisy channels
    Bennett, CH
    Brassard, G
    Popescu, S
    Schumacher, B
    Smolin, JA
    Wootters, WK
    [J]. PHYSICAL REVIEW LETTERS, 1996, 76 (05) : 722 - 725
  • [5] Optimal eavesdropping in quantum cryptography with six states
    Bruss, D
    [J]. PHYSICAL REVIEW LETTERS, 1998, 81 (14) : 3018 - 3021
  • [6] Quantum copying: Beyond the no-cloning theorem
    Buzek, V
    Hillery, M
    [J]. PHYSICAL REVIEW A, 1996, 54 (03): : 1844 - 1852
  • [7] PROPOSED EXPERIMENT TO TEST LOCAL HIDDEN-VARIABLE THEORIES
    CLAUSER, JF
    HORNE, MA
    SHIMONY, A
    HOLT, RA
    [J]. PHYSICAL REVIEW LETTERS, 1969, 23 (15) : 880 - &
  • [8] CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
  • [9] Quantum privacy amplification and the security of quantum cryptography over noisy channels
    Deutsch, D
    Ekert, A
    Jozsa, R
    Macchiavello, C
    Popescu, S
    Sanpera, A
    [J]. PHYSICAL REVIEW LETTERS, 1996, 77 (13) : 2818 - 2821
  • [10] DIVINCENZO DP, 1999, QUANTPH9910026