Practical device-independent quantum cryptography via entropy accumulation

The security of DIQKD is difficult to prove, as one needs to take into account every possible attack strategy. Here, the authors develop a method to determine the entropy of a system as the sum of the entropies of its parts. Applied to DIQKD, this implies that it suffices to consider i.i.d. attacks.

Saved in:
Bibliographic Details
Main Authors: Rotem Arnon-Friedman, Frédéric Dupuis, Omar Fawzi, Renato Renner, Thomas Vidick
Format: article
Language:EN
Published: Nature Portfolio 2018
Subjects:
Q
Online Access:https://doaj.org/article/b145f0c07f1844859fe7a39939946b6c
Tags: Add Tag
No Tags, Be the first to tag this record!