Graphical Methods in Device-Independent Quantum Cryptography
نویسندگان
چکیده
We introduce a framework for graphical security proofs in device-independent quantum cryptography using the methods of categorical quantum mechanics. We are optimistic that this approach will make some of the highly complex proofs in quantum cryptography more accessible, facilitate the discovery of new proofs, and enable automated proof verification. As an example of our framework, we reprove a recent result from device-independent quantum cryptography: any linear randomness expansion protocol can be converted into an unbounded randomness expansion protocol. We give a graphical exposition of a proof of this result and implement parts of it in the Globular proof assistant.
منابع مشابه
Finite-size analysis of measurement-device-independent quantum cryptography with continuous variables
متن کامل
Device-independent uncertainty for binary observables
We investigate entropic uncertainty relations for two or more binary measurements. We show that the effective anti-commutator is a useful measure of incompatibility and gives rise to strong uncertainty relations. Since the effective anti-commutator can be certified device-independently it leads us to device-independent uncertainty. Our relations, expressed in terms of conditional Rényi entropie...
متن کاملDevice-Independent Relativistic Quantum Bit Commitment
We examine the possibility of device-independent relativistic quantum bit commitment. We note the potential threat of location attacks, in which the behaviour of untrusted devices used in relativistic quantum cryptography depends on their space-time location. We describe relativistic quantum bit commitment schemes that are immune to these attacks, and show that these schemes offer device-indepe...
متن کاملAn Elementary Proof of Private Random Number Generation from Bell Inequalities
The field of device-independent quantum cryptography has seen enormous success in the past several years, including security proofs for key distribution and random number generation that account for arbitrary imperfections in the devices used. Full security proofs in the field so far are long and technically deep. In this paper we show that the concept of the mirror adversary can be used to sim...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017