Physics – Quantum Physics
Scientific paper
2006-06-06
Physics
Quantum Physics
12 pages, 2 figure
Scientific paper
We analyze a protocol which generates secret key from correlations that violate a Bell inequality by a sufficient amount, and prove its security against eavesdroppers which are only constrained by the fact that any information accessible to them must be compatible with the impossibility of arbitrarily fast signaling. We prove unconditional security according to the strongest notion, the so called universally-composable security. The no-signaling assumption is imposed at the level of the outcome probabilities given the choice of the observable, therefore, the protocol remains secure in situations where the honest parties do not have a complete control over their quantum apparatuses, or distrust them. The techniques developed are very general and can be applied to other Bell inequality-based protocols. In particular, we provide a scheme for estimating Bell-inequality violations when the samples are not independent and identically distributed.
Barrett James
Christandl Matthias
Masanes Ll.
Renner Renato
Winter Amos
No associations
LandOfFree
Unconditional security of key distribution from causality constraints does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Unconditional security of key distribution from causality constraints, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Unconditional security of key distribution from causality constraints will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-3607