pith. machine review for the scientific record. sign in

arxiv: quant-ph/0702152 · v2 · submitted 2007-02-15 · 🪐 quant-ph

Recognition: unknown

Device-independent security of quantum cryptography against collective attacks

Authors on Pith no claims yet
classification 🪐 quant-ph
keywords quantumcollectivedevice-independentsecurityamountassumptionsattackattacks
0
0 comments X
read the original abstract

We present the optimal collective attack on a Quantum Key Distribution (QKD) protocol in the "device-independent" security scenario, where no assumptions are made about the way the QKD devices work or on what quantum system they operate. Our main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. The minimal example of quantum network Bell nonlocality

    quant-ph 2026-05 unverdicted novelty 8.0

    Quantum nonlocality is possible in the triangle network with no inputs and binary outputs, which is the smallest such scenario by number of variables and outcomes.