Cargando…
Practical device-independent quantum cryptography via entropy accumulation
Device-independent cryptography goes beyond conventional quantum cryptography by providing security that holds independently of the quality of the underlying physical devices. Device-independent protocols are based on the quantum phenomena of non-locality and the violation of Bell inequalities. This...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5792631/ https://www.ncbi.nlm.nih.gov/pubmed/29386507 http://dx.doi.org/10.1038/s41467-017-02307-4 |
_version_ | 1783296777637593088 |
---|---|
author | Arnon-Friedman, Rotem Dupuis, Frédéric Fawzi, Omar Renner, Renato Vidick, Thomas |
author_facet | Arnon-Friedman, Rotem Dupuis, Frédéric Fawzi, Omar Renner, Renato Vidick, Thomas |
author_sort | Arnon-Friedman, Rotem |
collection | PubMed |
description | Device-independent cryptography goes beyond conventional quantum cryptography by providing security that holds independently of the quality of the underlying physical devices. Device-independent protocols are based on the quantum phenomena of non-locality and the violation of Bell inequalities. This high level of security could so far only be established under conditions which are not achievable experimentally. Here we present a property of entropy, termed “entropy accumulation”, which asserts that the total amount of entropy of a large system is the sum of its parts. We use this property to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters. Recent experimental progress, which enabled loophole-free Bell tests, suggests that the achieved parameters are technologically accessible. Our work hence provides the theoretical groundwork for experimental demonstrations of device-independent cryptography. |
format | Online Article Text |
id | pubmed-5792631 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-57926312018-02-02 Practical device-independent quantum cryptography via entropy accumulation Arnon-Friedman, Rotem Dupuis, Frédéric Fawzi, Omar Renner, Renato Vidick, Thomas Nat Commun Article Device-independent cryptography goes beyond conventional quantum cryptography by providing security that holds independently of the quality of the underlying physical devices. Device-independent protocols are based on the quantum phenomena of non-locality and the violation of Bell inequalities. This high level of security could so far only be established under conditions which are not achievable experimentally. Here we present a property of entropy, termed “entropy accumulation”, which asserts that the total amount of entropy of a large system is the sum of its parts. We use this property to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters. Recent experimental progress, which enabled loophole-free Bell tests, suggests that the achieved parameters are technologically accessible. Our work hence provides the theoretical groundwork for experimental demonstrations of device-independent cryptography. Nature Publishing Group UK 2018-01-31 /pmc/articles/PMC5792631/ /pubmed/29386507 http://dx.doi.org/10.1038/s41467-017-02307-4 Text en © The Author(s) 2018 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. |
spellingShingle | Article Arnon-Friedman, Rotem Dupuis, Frédéric Fawzi, Omar Renner, Renato Vidick, Thomas Practical device-independent quantum cryptography via entropy accumulation |
title | Practical device-independent quantum cryptography via entropy accumulation |
title_full | Practical device-independent quantum cryptography via entropy accumulation |
title_fullStr | Practical device-independent quantum cryptography via entropy accumulation |
title_full_unstemmed | Practical device-independent quantum cryptography via entropy accumulation |
title_short | Practical device-independent quantum cryptography via entropy accumulation |
title_sort | practical device-independent quantum cryptography via entropy accumulation |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5792631/ https://www.ncbi.nlm.nih.gov/pubmed/29386507 http://dx.doi.org/10.1038/s41467-017-02307-4 |
work_keys_str_mv | AT arnonfriedmanrotem practicaldeviceindependentquantumcryptographyviaentropyaccumulation AT dupuisfrederic practicaldeviceindependentquantumcryptographyviaentropyaccumulation AT fawziomar practicaldeviceindependentquantumcryptographyviaentropyaccumulation AT rennerrenato practicaldeviceindependentquantumcryptographyviaentropyaccumulation AT vidickthomas practicaldeviceindependentquantumcryptographyviaentropyaccumulation |