Device-independent quantum key distribution secure against collective attacks

被引:382
作者
Pironio, Stefano [1 ]
Acin, Antonio [2 ,3 ]
Brunner, Nicolas [4 ]
Gisin, Nicolas [1 ]
Massar, Serge [5 ]
Scarani, Valerio [6 ,7 ]
机构
[1] Univ Geneva, Appl Phys Grp, CH-1211 Geneva 4, Switzerland
[2] ICFO, Castelldefels 08860, Spain
[3] ICREA, Barcelona 08010, Spain
[4] Univ Bristol, HH Wills Phys Lab, Bristol BS8 1TL, Avon, England
[5] Univ Libre Brussels, Lab Informat Quant, B-1050 Brussels, Belgium
[6] Natl Univ Singapore, Ctr Quantum Technol, Singapore 117548, Singapore
[7] Natl Univ Singapore, Dept Phys, Singapore 117548, Singapore
来源
NEW JOURNAL OF PHYSICS | 2009年 / 11卷
基金
美国国家科学基金会; 新加坡国家研究基金会;
关键词
BELL INEQUALITIES; CRYPTOGRAPHY; VIOLATION; THEOREM; STATES;
D O I
10.1088/1367-2630/11/4/045021
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows from the laws of quantum physics, but contrary to usual QKD, it does not rely on any assumptions about the internal working of the quantum devices used in the protocol. In this paper, we present in detail the security proof for a DIQKD protocol introduced in Acin et al (2008 Phys. Rev. Lett. 98 230501). This proof exploits the full structure of quantum theory (as opposed to other proofs that exploit only the no-signaling principle), but only holds against collective attacks, where the eavesdropper is assumed to act on the quantum systems of the honest parties independently and identically in each round of the protocol (although she can act coherently on her systems at any time). The security of any DIQKD protocol necessarily relies on the violation of a Bell inequality. We discuss the issue of loopholes in Bell experiments in this context.
引用
收藏
页数:25
相关论文
共 58 条
  • [1] Device-independent security of quantum cryptography against collective attacks
    Acin, Antonio
    Brunner, Nicolas
    Gisin, Nicolas
    Massar, Serge
    Pironio, Stefano
    Scarani, Valerio
    [J]. PHYSICAL REVIEW LETTERS, 2007, 98 (23)
  • [2] Efficient quantum key distribution secure against no-signalling eavesdroppers
    Acin, Antonio
    Massar, Serge
    Pironio, Stefano
    [J]. NEW JOURNAL OF PHYSICS, 2006, 8
  • [3] From Bell's theorem to secure quantum key distribution
    Acin, Antonio
    Gisin, Nicolas
    Masanes, Lluis
    [J]. PHYSICAL REVIEW LETTERS, 2006, 97 (12)
  • [4] EXPERIMENTAL TEST OF BELL INEQUALITIES USING TIME-VARYING ANALYZERS
    ASPECT, A
    DALIBARD, J
    ROGER, G
    [J]. PHYSICAL REVIEW LETTERS, 1982, 49 (25) : 1804 - 1807
  • [5] No signaling and quantum key distribution
    Barrett, J
    Hardy, L
    Kent, A
    [J]. PHYSICAL REVIEW LETTERS, 2005, 95 (01)
  • [6] Nonlocal correlations as an information-theoretic resource
    Barrett, J
    Linden, N
    Massar, S
    Pironio, S
    Popescu, S
    Roberts, D
    [J]. PHYSICAL REVIEW A, 2005, 71 (02):
  • [7] Maximally nonlocal and monogamous quantum correlations
    Barrett, Jonathan
    Kent, Adrian
    Pironio, Stefano
    [J]. PHYSICAL REVIEW LETTERS, 2006, 97 (17)
  • [8] The de Finetti theorem for test spaces
    Barrett, Jonathan
    Leifer, Matthew
    [J]. NEW JOURNAL OF PHYSICS, 2009, 11
  • [9] Bell JS., 1987, Speakable and unspeakable in quantum mechanics
  • [10] Bennett C.H., 1984, P IEEE INT C COMP SY, V175, DOI DOI 10.1016/J.TCS.2014.05.025