Practical device-independent quantum cryptography via entropy accumulation
Open Access
- 31 January 2018
- journal article
- research article
- Published by Springer Science and Business Media LLC in Nature Communications
- Vol. 9 (1), 1-11
- https://doi.org/10.1038/s41467-017-02307-4
Abstract
Device-independent cryptography goes beyond conventional quantum cryptography by providing security that holds independently of the quality of the underlying physical devices. Device-independent protocols are based on the quantum phenomena of non-locality and the violation of Bell inequalities. This high level of security could so far only be established under conditions which are not achievable experimentally. Here we present a property of entropy, termed “entropy accumulation”, which asserts that the total amount of entropy of a large system is the sum of its parts. We use this property to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters. Recent experimental progress, which enabled loophole-free Bell tests, suggests that the achieved parameters are technologically accessible. Our work hence provides the theoretical groundwork for experimental demonstrations of device-independent cryptography.This publication has 40 references indexed in Scilit:
- Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectorsNew Journal of Physics, 2011
- Full-field implementation of a perfect eavesdropper on a quantum cryptography systemNature Communications, 2011
- Hacking commercial quantum cryptography systems by tailored bright illuminationNature Photonics, 2010
- The uncertainty principle in the presence of quantum memoryNature Physics, 2010
- Random numbers certified by Bell’s theoremNature, 2010
- Postselection Technique for Quantum Channels with Applications to Quantum CryptographyPhysical Review Letters, 2009
- Quantum Cryptography with Finite Resources: Unconditional Security Bound for Discrete-Variable Protocols with One-Way PostprocessingPhysical Review Letters, 2008
- Unconditional Optimality of Gaussian Attacks against Continuous-Variable Quantum Key DistributionPhysical Review Letters, 2006
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991
- Proposed Experiment to Test Local Hidden-Variable TheoriesPhysical Review Letters, 1969