No signaling and quantum key distribution

被引:673
作者
Barrett, J
Hardy, L
Kent, A
机构
[1] Free Univ Brussels, B-1050 Brussels, Belgium
[2] Free Univ Brussels, Ctr Quantum Informat & Commun, B-1050 Brussels, Belgium
[3] Perimeter Inst, Waterloo, ON N2J 2W9, Canada
[4] Univ Cambridge, Ctr Math Sci, Ctr Quatum Computat, DAMTP, Cambridge CB3 0WA, England
关键词
D O I
10.1103/PhysRevLett.95.010503
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Standard quantum key distribution protocols are provably secure against eavesdropping attacks, if quantum theory is correct. It is theoretically interesting to know if we need to assume the validity of quantum theory to prove the security of quantum key distribution, or whether its security can be based on other physical principles. The question would also be of practical interest if quantum mechanics were ever to fail in some regime, because a scientifically and technologically advanced eavesdropper could perhaps use postquantum physics to extract information from quantum communications without necessarily causing the quantum state disturbances on which existing security proofs rely. Here we describe a key distribution scheme provably secure against general attacks by a postquantum eavesdropper limited only by the impossibility of superluminal signaling. Its security stems from violation of a Bell inequality.
引用
收藏
页数:4
相关论文
共 21 条
  • [1] Barnum H, 2002, ANN IEEE SYMP FOUND, P449, DOI 10.1109/SFCS.2002.1181969
  • [2] Nonlocal correlations as an information-theoretic resource
    Barrett, J
    Linden, N
    Massar, S
    Pironio, S
    Popescu, S
    Roberts, D
    [J]. PHYSICAL REVIEW A, 2005, 71 (02):
  • [3] Bell JS., 1964, PHYS PHYS FIZIKA, V1, P195, DOI [10.1103/Physics-PhysiqueFizika.1.195, 10.1103/PhysicsPhysiqueFizika.1.195, DOI 10.1103/PHYSICSPHYSIQUEFIZIKA.1.195]
  • [4] Bennett C.H., 1984, P IEEE INT C COMP SY, P175, DOI DOI 10.1016/J.TCS.2014.05.025
  • [5] QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM
    BENNETT, CH
    BRASSARD, G
    MERMIN, ND
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (05) : 557 - 559
  • [6] WRINGING OUT BETTER BELL INEQUALITIES
    BRAUNSTEIN, SL
    CAVES, CM
    [J]. ANNALS OF PHYSICS, 1990, 202 (01) : 22 - 56
  • [7] PROPOSED EXPERIMENT TO TEST LOCAL HIDDEN-VARIABLE THEORIES
    CLAUSER, JF
    HORNE, MA
    SHIMONY, A
    HOLT, RA
    [J]. PHYSICAL REVIEW LETTERS, 1969, 23 (15) : 880 - &
  • [8] How to share a quantum secret
    Cleve, R
    Gottesman, D
    Lo, HK
    [J]. PHYSICAL REVIEW LETTERS, 1999, 83 (03) : 648 - 651
  • [9] Crepeau C., 2002, P THIRY 4 ANN ACM S, P643, DOI DOI 10.1145/509907.510000
  • [10] QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM
    EKERT, AK
    [J]. PHYSICAL REVIEW LETTERS, 1991, 67 (06) : 661 - 663