Cargando…

Practical device-independent quantum cryptography via entropy accumulation

Device-independent cryptography goes beyond conventional quantum cryptography by providing security that holds independently of the quality of the underlying physical devices. Device-independent protocols are based on the quantum phenomena of non-locality and the violation of Bell inequalities. This...

Descripción completa

Detalles Bibliográficos
Autores principales: Arnon-Friedman, Rotem, Dupuis, Frédéric, Fawzi, Omar, Renner, Renato, Vidick, Thomas
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5792631/
https://www.ncbi.nlm.nih.gov/pubmed/29386507
http://dx.doi.org/10.1038/s41467-017-02307-4
_version_ 1783296777637593088
author Arnon-Friedman, Rotem
Dupuis, Frédéric
Fawzi, Omar
Renner, Renato
Vidick, Thomas
author_facet Arnon-Friedman, Rotem
Dupuis, Frédéric
Fawzi, Omar
Renner, Renato
Vidick, Thomas
author_sort Arnon-Friedman, Rotem
collection PubMed
description Device-independent cryptography goes beyond conventional quantum cryptography by providing security that holds independently of the quality of the underlying physical devices. Device-independent protocols are based on the quantum phenomena of non-locality and the violation of Bell inequalities. This high level of security could so far only be established under conditions which are not achievable experimentally. Here we present a property of entropy, termed “entropy accumulation”, which asserts that the total amount of entropy of a large system is the sum of its parts. We use this property to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters. Recent experimental progress, which enabled loophole-free Bell tests, suggests that the achieved parameters are technologically accessible. Our work hence provides the theoretical groundwork for experimental demonstrations of device-independent cryptography.
format Online
Article
Text
id pubmed-5792631
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-57926312018-02-02 Practical device-independent quantum cryptography via entropy accumulation Arnon-Friedman, Rotem Dupuis, Frédéric Fawzi, Omar Renner, Renato Vidick, Thomas Nat Commun Article Device-independent cryptography goes beyond conventional quantum cryptography by providing security that holds independently of the quality of the underlying physical devices. Device-independent protocols are based on the quantum phenomena of non-locality and the violation of Bell inequalities. This high level of security could so far only be established under conditions which are not achievable experimentally. Here we present a property of entropy, termed “entropy accumulation”, which asserts that the total amount of entropy of a large system is the sum of its parts. We use this property to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters. Recent experimental progress, which enabled loophole-free Bell tests, suggests that the achieved parameters are technologically accessible. Our work hence provides the theoretical groundwork for experimental demonstrations of device-independent cryptography. Nature Publishing Group UK 2018-01-31 /pmc/articles/PMC5792631/ /pubmed/29386507 http://dx.doi.org/10.1038/s41467-017-02307-4 Text en © The Author(s) 2018 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
spellingShingle Article
Arnon-Friedman, Rotem
Dupuis, Frédéric
Fawzi, Omar
Renner, Renato
Vidick, Thomas
Practical device-independent quantum cryptography via entropy accumulation
title Practical device-independent quantum cryptography via entropy accumulation
title_full Practical device-independent quantum cryptography via entropy accumulation
title_fullStr Practical device-independent quantum cryptography via entropy accumulation
title_full_unstemmed Practical device-independent quantum cryptography via entropy accumulation
title_short Practical device-independent quantum cryptography via entropy accumulation
title_sort practical device-independent quantum cryptography via entropy accumulation
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5792631/
https://www.ncbi.nlm.nih.gov/pubmed/29386507
http://dx.doi.org/10.1038/s41467-017-02307-4
work_keys_str_mv AT arnonfriedmanrotem practicaldeviceindependentquantumcryptographyviaentropyaccumulation
AT dupuisfrederic practicaldeviceindependentquantumcryptographyviaentropyaccumulation
AT fawziomar practicaldeviceindependentquantumcryptographyviaentropyaccumulation
AT rennerrenato practicaldeviceindependentquantumcryptographyviaentropyaccumulation
AT vidickthomas practicaldeviceindependentquantumcryptographyviaentropyaccumulation