Upper Bounds on Device-Independent Quantum Key Distribution Rates and a Revised Peres Conjecture

被引:9
作者
Arnon-Friedman, Rotem [1 ,2 ]
Leditzky, Felix [3 ,4 ,5 ,6 ,7 ,8 ,9 ]
机构
[1] Univ Calif Berkeley, Dept Elect Engn & Comp Sci EECS, Berkeley, CA 94720 USA
[2] Weizmann Inst Sci, Dept Phys Complex Syst, IL-7610001 Rehovot, Israel
[3] Univ Colorado Boulder, JILA, Boulder, CO 80309 USA
[4] Univ Colorado Boulder, Ctr Theory Quantum Matter, Boulder, CO 80309 USA
[5] Univ Waterloo, Inst Quantum Comp, Waterloo, ON N2L 3G1, Canada
[6] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON N2L 3G1, Canada
[7] Perimeter Inst Theoret Phys, Waterloo, ON N2L 2Y5, Canada
[8] Univ Illinois UrbanaChampaign, Dept Math, Urbana, IL 61801 USA
[9] Univ Illinois UrbanaChampaign, IQUIST, Urbana, IL 61801 USA
基金
瑞士国家科学基金会; 美国国家科学基金会;
关键词
Protocols; Games; Upper bound; Quantum entanglement; Performance evaluation; Standards; Random variables; Quantum cryptography; quantum entanglement; quantum information theory; device-independence; ENTANGLEMENT; DISTILLATION; CRYPTOGRAPHY; CAPACITY;
D O I
10.1109/TIT.2021.3086505
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Device-independent quantum key distribution (DIQKD) is one of the most challenging tasks in quantum cryptography. The protocols and their security are based on the existence of Bell inequalities and the ability to violate them by measuring entangled states. We study the entanglement needed for DIQKD protocols in two different ways. Our first contribution is the derivation of upper bounds on the key rates of CHSH-based DIQKD protocols in terms of the violation of the inequality; this sets an upper limit on the possible DI key extraction rate from states with a given violation. Our upper bound improves on the previously known bound of Kaur et al. Our second contribution is the initiation of the study of the role of bound entangled states in DIQKD. We present a revised Peres conjecture stating that such states cannot be used as a resource for DIQKD. We give a first piece of evidence for the conjecture by showing that the bound entangled state found by Vertesi and Brunner, even though it can certify DI randomness, cannot be used to produce a key using protocols analogous to the well-studied CHSH-based DIQKD protocol.
引用
收藏
页码:6606 / 6618
页数:13
相关论文
共 36 条
  • [1] Arnon-Friedman R., 2018, THESIS SWISS FEDERAL
  • [2] SIMPLE AND TIGHT DEVICE-INDEPENDENT SECURITY PROOFS
    Arnon-Friedman, Rotem
    Renner, Renato
    Vidick, Thomas
    [J]. SIAM JOURNAL ON COMPUTING, 2019, 48 (01) : 181 - 225
  • [3] Practical device-independent quantum cryptography via entropy accumulation
    Arnon-Friedman, Rotem
    Dupuis, Frederic
    Fawzi, Omar
    Renner, Renato
    Vidick, Thomas
    [J]. NATURE COMMUNICATIONS, 2018, 9
  • [4] On quantum fidelities and channel capacities
    Barnum, H
    Knill, E
    Nielsen, MA
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1317 - 1329
  • [5] Bell J S., 1964, Physics, V1, P195, DOI [10.1103/Physics-PhysiqueFizika.1.195, 10.1103/PhysicsPhysiqueFizika.1.195, DOI 10.1103/PHYSICSPHYSIQUEFIZIKA.1.195]
  • [6] Bennett CH, 1996, PHYS REV A, V54, P3824, DOI 10.1103/PhysRevA.54.3824
  • [7] Bell nonlocality
    Brunner, Nicolas
    Cavalcanti, Daniel
    Pironio, Stefano
    Scarani, Valerio
    Wehner, Stephanie
    [J]. REVIEWS OF MODERN PHYSICS, 2014, 86 (02) : 419 - 478
  • [8] Christandl M, 2007, LECT NOTES COMPUT SC, V4392, P456
  • [9] Upper Bounds on Device-Independent Quantum Key Distribution
    Christandl, Matthias
    Ferrara, Roberto
    Horodecki, Karol
    [J]. PHYSICAL REVIEW LETTERS, 2021, 126 (16)
  • [10] PROPOSED EXPERIMENT TO TEST LOCAL HIDDEN-VARIABLE THEORIES
    CLAUSER, JF
    HORNE, MA
    SHIMONY, A
    HOLT, RA
    [J]. PHYSICAL REVIEW LETTERS, 1969, 23 (15) : 880 - &