Practical device-independent quantum cryptography via entropy accumulation
The security of DIQKD is difficult to prove, as one needs to take into account every possible attack strategy. Here, the authors develop a method to determine the entropy of a system as the sum of the entropies of its parts. Applied to DIQKD, this implies that it suffices to consider i.i.d. attacks.
Saved in:
Main Authors: | , , , , |
---|---|
Format: | article |
Language: | EN |
Published: |
Nature Portfolio
2018
|
Subjects: | |
Online Access: | https://doaj.org/article/b145f0c07f1844859fe7a39939946b6c |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|