Recognition: unknown
Device-independent security of quantum cryptography against collective attacks
classification
🪐 quant-ph
keywords
quantumcollectivedevice-independentsecurityamountassumptionsattackattacks
read the original abstract
We present the optimal collective attack on a Quantum Key Distribution (QKD) protocol in the "device-independent" security scenario, where no assumptions are made about the way the QKD devices work or on what quantum system they operate. Our main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.
This paper has not been read by Pith yet.
Forward citations
Cited by 1 Pith paper
-
The minimal example of quantum network Bell nonlocality
Quantum nonlocality is possible in the triangle network with no inputs and binary outputs, which is the smallest such scenario by number of variables and outcomes.
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.