Universally-composable privacy amplification from causality constraints

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

4 pages

Scientific paper

We consider schemes for secret key distribution which use as a resource correlations that violate Bell inequalities. We provide the first security proof for such schemes, according to the strongest notion of security, the so called universally-composable security. Our security proof does not rely on the validity of quantum mechanics, it solely relies on the impossibility of arbitrarily-fast signaling between separate physical systems. This allows for secret communication in situations where the participants distrust their quantum devices.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Universally-composable privacy amplification from causality constraints does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Universally-composable privacy amplification from causality constraints, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Universally-composable privacy amplification from causality constraints will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-443309

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.