Device-independent cryptography represent the strongest form of physical security: it is based on general physical laws and does not require any detailed knowledge or control of the physical devices used in the protocol. We discuss a general security proof valid for a large class of device-independent quantum key distribution protocols. The proof relies on the validity of Quantum Theory and requires that the events generating the raw key are causally disconnected. We then apply the proof to the chained Bell inequalities and compute the corresponding secret-key rates. © 2014 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Dhara, C., Masanes, L., Pironio, S., & Acín, A. (2014). Security of device-independent quantum key distribution protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6745 LNCS, pp. 13–22). Springer Verlag. https://doi.org/10.1007/978-3-642-54429-3_2
Mendeley helps you to discover research relevant for your work.