Device independence for two-party cryptography and position verification with memoryless devices

被引:12
作者
Ribeiro, Jeremy [1 ]
Le Phuc Thinh [1 ,2 ]
Kaniewski, Jedrzej [1 ,2 ,3 ]
Helsen, Jonas [1 ]
Wehner, Stephanie [1 ]
机构
[1] Delft Univ Technol, QuTech, Lorentzweg 1, NL-2628 CJ Delft, Netherlands
[2] Natl Univ Singapore, Ctr Quantum Technol, 3 Sci Dr 2, Singapore 117543, Singapore
[3] Univ Copenhagen, Dept Math Sci, Univ Pk 5, DK-2100 Copenhagen, Denmark
基金
新加坡国家研究基金会;
关键词
QUANTUM BIT COMMITMENT; UNCONDITIONAL SECURITY;
D O I
10.1103/PhysRevA.97.062307
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. Unfortunately, security of these protocols is not possible against an all powerful adversary. However, if we impose some realistic physical constraints on the adversary, there exist protocols for which security can be proven, but these so far relied on the knowledge of the quantum operations performed during the protocols. In this work we improve the device-independent security proofs of Kaniewski andWehner [New J. Phys. 18, 055004 (2016)] for two-party cryptography (with memoryless devices) and we add a security proof for device-independent position verification (also memoryless devices) under different physical constraints on the adversary. We assess the quality of the devices by observing a Bell violation, and, as for Kaniewski and Wehner [New J. Phys. 18, 055004 (2016)], security can be attained for any violation of the Clauser-Holt-Shimony-Horne inequality.
引用
收藏
页数:22
相关论文
共 36 条
[1]   Device-independent security of quantum cryptography against collective attacks [J].
Acin, Antonio ;
Brunner, Nicolas ;
Gisin, Nicolas ;
Massar, Serge ;
Pironio, Stefano ;
Scarani, Valerio .
PHYSICAL REVIEW LETTERS, 2007, 98 (23)
[2]   Memory Attacks on Device-Independent Quantum Cryptography [J].
Barrett, Jonathan ;
Colbeck, Roger ;
Kent, Adrian .
PHYSICAL REVIEW LETTERS, 2013, 110 (01)
[3]   Unconditionally secure device-independent quantum key distribution with only two devices [J].
Barrett, Jonathan ;
Colbeck, Roger ;
Kent, Adrian .
PHYSICAL REVIEW A, 2012, 86 (06)
[4]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[5]   Entanglement Cost of Quantum Channels [J].
Berta, Mario ;
Brandao, Fernando G. S. L. ;
Christandl, Matthias ;
Wehner, Stephanie .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (10) :6779-6795
[6]   One-Shot Rates for Entanglement Manipulation Under Non-entangling Maps [J].
Brandao, Fernando G. S. L. ;
Datta, Nilanjana .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (03) :1754-1760
[7]   POSITION-BASED QUANTUM CRYPTOGRAPHY: IMPOSSIBILITY AND CONSTRUCTIONS [J].
Buhrman, Harry ;
Chandran, Nishanth ;
Fehr, Serge ;
Gelles, Ran ;
Goyal, Vipul ;
Ostrovsky, Rafail ;
Schaffner, Christian .
SIAM JOURNAL ON COMPUTING, 2014, 43 (01) :150-178
[8]  
Cachin C, 1997, LECT NOTES COMPUT SC, V1294, P292
[9]   PROPOSED EXPERIMENT TO TEST LOCAL HIDDEN-VARIABLE THEORIES [J].
CLAUSER, JF ;
HORNE, MA ;
SHIMONY, A ;
HOLT, RA .
PHYSICAL REVIEW LETTERS, 1969, 23 (15) :880-&
[10]  
Damgard I., 2005, BRICS REPORT SERIES, V12