TY - JOUR
T1 - Full security of quantum key distribution from no-signaling constraints
AU - Masanes, Lluís
AU - Renner, Renato
AU - Christandl, Matthias
AU - Winter, Andreas
AU - Barrett, Jonathan
PY - 2014/1/1
Y1 - 2014/1/1
N2 - We analyze a cryptographic protocol for generating a distributed secret key from correlations that violate a Bell inequality by a sufficient amount, and prove its security against eavesdroppers, constrained only by the assumption that any information accessible to them must be compatible with the non-signaling principle. The claim holds with respect to the state-of-the-art security definition used in cryptography, known as universally-composable security. The non-signaling assumption only refers to the statistics of measurement outcomes depending on the choices of measurements; hence security is independent of the internal workings of the devices - they do not even need to follow the laws of quantum theory. This is relevant for practice as a correct and complete modeling of realistic devices is generally impossible. The techniques developed are general and can be applied to other Bell inequality-based protocols. In particular, we provide a scheme for estimating Bell-inequality violations when the samples are not independent and identically distributed. © 2014 IEEE.
AB - We analyze a cryptographic protocol for generating a distributed secret key from correlations that violate a Bell inequality by a sufficient amount, and prove its security against eavesdroppers, constrained only by the assumption that any information accessible to them must be compatible with the non-signaling principle. The claim holds with respect to the state-of-the-art security definition used in cryptography, known as universally-composable security. The non-signaling assumption only refers to the statistics of measurement outcomes depending on the choices of measurements; hence security is independent of the internal workings of the devices - they do not even need to follow the laws of quantum theory. This is relevant for practice as a correct and complete modeling of realistic devices is generally impossible. The techniques developed are general and can be applied to other Bell inequality-based protocols. In particular, we provide a scheme for estimating Bell-inequality violations when the samples are not independent and identically distributed. © 2014 IEEE.
KW - Quantum mechanics
KW - cryptographic protocols
KW - cryptography
KW - quantum entanglement
KW - random number generation
UR - https://www.scopus.com/pages/publications/84904702369
U2 - 10.1109/TIT.2014.2329417
DO - 10.1109/TIT.2014.2329417
M3 - Article
SN - 0018-9448
VL - 60
SP - 4973
EP - 4986
JO - IEEE Transactions on Information Theory
JF - IEEE Transactions on Information Theory
M1 - 6846344
ER -