Standard

Fully device-independent conference key agreement. / Ribeiro, Jérémy; Murta, Gláucia; Wehner, Stephanie.

In: Physical Review A, Vol. 97, No. 2, 022307, 06.02.2018.

Research output: Contribution to journalArticleScientificpeer-review

Harvard

APA

Vancouver

Author

Ribeiro, Jérémy ; Murta, Gláucia ; Wehner, Stephanie. / Fully device-independent conference key agreement. In: Physical Review A. 2018 ; Vol. 97, No. 2.

BibTeX

@article{6899d4da2d7142f5b959f38dde3a2933,
title = "Fully device-independent conference key agreement",
abstract = "We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N-partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N-1. We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N-1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.",
author = "J{\'e}r{\'e}my Ribeiro and Gl{\'a}ucia Murta and Stephanie Wehner",
year = "2018",
month = "2",
day = "6",
doi = "10.1103/PhysRevA.97.022307",
language = "English",
volume = "97",
journal = "Physical Review A: covering atomic, molecular, and optical physics and quantum information",
issn = "2469-9926",
publisher = "American Physical Society",
number = "2",

}

RIS

TY - JOUR

T1 - Fully device-independent conference key agreement

AU - Ribeiro, Jérémy

AU - Murta, Gláucia

AU - Wehner, Stephanie

PY - 2018/2/6

Y1 - 2018/2/6

N2 - We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N-partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N-1. We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N-1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

AB - We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N-partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N-1. We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N-1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

UR - http://www.scopus.com/inward/record.url?scp=85042132372&partnerID=8YFLogxK

U2 - 10.1103/PhysRevA.97.022307

DO - 10.1103/PhysRevA.97.022307

M3 - Article

VL - 97

JO - Physical Review A: covering atomic, molecular, and optical physics and quantum information

T2 - Physical Review A: covering atomic, molecular, and optical physics and quantum information

JF - Physical Review A: covering atomic, molecular, and optical physics and quantum information

SN - 2469-9926

IS - 2

M1 - 022307

ER -

ID: 45052679