Unconditionally secure device-independent quantum key distribution with only two devices
نویسندگان
چکیده
منابع مشابه
Unconditionally secure device-independent quantum key distribution with only two devices
Jonathan Barrett, ∗ Roger Colbeck, † and Adrian Kent 4, ‡ Royal Holloway, University of London, Egham Hill, Egham TW20 0EX, U.K. Institute for Theoretical Physics, ETH Zurich, 8093 Zurich, Switzerland. Centre for Quantum Information and Foundations, DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge, CB3 0WA, U.K. Perimeter Institute for Theoretical Ph...
متن کاملUnconditionally Secure Multipartite Quantum Key Distribution
We consider the problem of secure key distribution among n trustful agents: the goal is to distribute an identical random bit-string among the n agents over a noisy channel such that eavesdroppers learn little about it. We study the general situation where the only resources required are secure bipartite key distribution and authenticated classical communication. Accordingly, multipartite quant...
متن کاملDevice-independent quantum key distribution
Quantum key distribution allows two parties connected by a quantum channel to establish a secret key that is unknown to any unauthorized third party. The secrecy of this key is based on the laws of quantum physics. For security, however, it is crucial that the honest parties are able to control their physical devices accurately and completely. The goal of device-independent quantum key distribu...
متن کاملUnconditionally Secure Quantum Key Distribution In Higher Dimensions
In search of a quantum key distribution scheme that could stand up for more drastic eavesdropping attack, I discover a prepare-and-measure scheme using N -dimensional quantum particles as information carriers where N is a prime power. Using the Shor-Preskill-type argument, I prove that this scheme is unconditional secure against all attacks allowed by the laws of quantum physics. Incidentally, ...
متن کاملUnconditionally secure key distribution based on two nonorthogonal states.
We prove the unconditional security of the Bennett 1992 protocol, by using a reduction to an entanglement distillation protocol initiated by a local filtering process. The bit errors and the phase errors are correlated after the filtering, and we can bound the amount of phase errors from the observed bit errors by an estimation method involving nonorthogonal measurements. The angle between the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2012
ISSN: 1050-2947,1094-1622
DOI: 10.1103/physreva.86.062326