Fully Device-Independent Quantum Key Distribution

被引:334
作者
Vazirani, Umesh [1 ]
Vidick, Thomas [2 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] CALTECH, Pasadena, CA 91125 USA
基金
美国国家科学基金会;
关键词
CRYPTOGRAPHY; THEOREM; STATES; ENTANGLEMENT; SECURITY; SYSTEMS;
D O I
10.1103/PhysRevLett.113.140501
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.
引用
收藏
页数:6
相关论文
共 53 条
  • [1] Device-independent security of quantum cryptography against collective attacks
    Acin, Antonio
    Brunner, Nicolas
    Gisin, Nicolas
    Massar, Serge
    Pironio, Stefano
    Scarani, Valerio
    [J]. PHYSICAL REVIEW LETTERS, 2007, 98 (23)
  • [2] Efficient quantum key distribution secure against no-signalling eavesdroppers
    Acin, Antonio
    Massar, Serge
    Pironio, Stefano
    [J]. NEW JOURNAL OF PHYSICS, 2006, 8
  • [3] From Bell's theorem to secure quantum key distribution
    Acin, Antonio
    Gisin, Nicolas
    Masanes, Lluis
    [J]. PHYSICAL REVIEW LETTERS, 2006, 97 (12)
  • [4] Aharonov D, 2013, COMPUTABILITY: TURING, GODEL, CHURCH, AND BEYOND, P329
  • [5] [Anonymous], P 44 S THEOR COMP ST
  • [6] [Anonymous], 2006, ARXIV09113814
  • [7] [Anonymous], 2014, PRL, V113
  • [8] Limits of privacy amplification against nonsignaling memory attacks
    Arnon-Friedman, Rotem
    Ta-Shma, Amnon
    [J]. PHYSICAL REVIEW A, 2012, 86 (06):
  • [9] Reversing quantum dynamics with near-optimal quantum and classical fidelity
    Barnum, H
    Knill, E
    [J]. JOURNAL OF MATHEMATICAL PHYSICS, 2002, 43 (05) : 2097 - 2106
  • [10] No signaling and quantum key distribution
    Barrett, J
    Hardy, L
    Kent, A
    [J]. PHYSICAL REVIEW LETTERS, 2005, 95 (01)