Security of device-independent quantum key distribution protocols

0Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Device-independent cryptography represent the strongest form of physical security: it is based on general physical laws and does not require any detailed knowledge or control of the physical devices used in the protocol. We discuss a general security proof valid for a large class of device-independent quantum key distribution protocols. The proof relies on the validity of Quantum Theory and requires that the events generating the raw key are causally disconnected. We then apply the proof to the chained Bell inequalities and compute the corresponding secret-key rates. © 2014 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Dhara, C., Masanes, L., Pironio, S., & Acín, A. (2014). Security of device-independent quantum key distribution protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6745 LNCS, pp. 13–22). Springer Verlag. https://doi.org/10.1007/978-3-642-54429-3_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free