Detecting quantum correlations for quantum key distribution

被引:1
作者
Curty, M [1 ]
Gühne, O [1 ]
Lewenstein, M [1 ]
Lütkenhaus, N [1 ]
机构
[1] Univ Erlangen Nurnberg, Inst Theoret Phys 1, D-91058 Erlangen, Germany
来源
QUANTUM OPTICS AND APPLICATIONS IN COMPUTING AND COMMUNICATIONS II | 2005年 / 5631卷
关键词
quantum key distribution; information theoretic security; entanglement;
D O I
10.1117/12.575411
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Practical quantum key distribution can be understood as a two-step procedure: in a first step two parties exchange quantum mechanical signals and perform measurements on them, in a second step auxiliary classical communication protocols are performed over an authenticated public channel to transform the data of the first step into an information-theoretic secure key. In this article we address the question of necessary conditions on the correlated (classical) data of the first step such that there can be a successful second step at all. As it turns out, a necessary condition is that these data, together with the knowledge about the physical set-up of sender and receiver, allow to establish a proof of effective entanglement between the two parties. We then demonstrate methods to systematically search for such a proof in basic settings, involving the 2-, 4-, and 6-state protocols.
引用
收藏
页码:9 / 19
页数:11
相关论文
共 50 条
  • [11] CHRITANDL M, 2004, QUANTPH0402131
  • [12] CORRECTION
    CLAUSER, JF
    [J]. PHYSICAL REVIEW LETTERS, 1970, 24 (10) : 549 - &
  • [13] A relevant two qubit Bell inequality inequivalent to the CHSH inequality
    Collins, D
    Gisin, N
    [J]. JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL, 2004, 37 (05): : 1775 - 1787
  • [14] CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
  • [15] Entanglement as a precondition for secure quantum key distribution -: art. no. 217903
    Curty, M
    Lewenstein, M
    Lütkenhaus, N
    [J]. PHYSICAL REVIEW LETTERS, 2004, 92 (21) : 217903 - 1
  • [16] Curty M., 2004, QUANTPH0409047
  • [17] Quantum privacy amplification and the security of quantum cryptography over noisy channels
    Deutsch, D
    Ekert, A
    Jozsa, R
    Macchiavello, C
    Popescu, S
    Sanpera, A
    [J]. PHYSICAL REVIEW LETTERS, 1996, 77 (13) : 2818 - 2821
  • [18] Relating quantum privacy and quantum coherence: An operational approach
    Devetak, I
    Winter, A
    [J]. PHYSICAL REVIEW LETTERS, 2004, 93 (08) : 080501 - 1
  • [19] ECKERT K, 2003, QUANTUM INFORMATION, P79
  • [20] QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM
    EKERT, AK
    [J]. PHYSICAL REVIEW LETTERS, 1991, 67 (06) : 661 - 663