Practical device-independent quantum cryptography via entropy accumulation

The security of DIQKD is difficult to prove, as one needs to take into account every possible attack strategy. Here, the authors develop a method to determine the entropy of a system as the sum of the entropies of its parts. Applied to DIQKD, this implies that it suffices to consider i.i.d. attacks.

Guardado en:
Detalles Bibliográficos
Autores principales: Rotem Arnon-Friedman, Frédéric Dupuis, Omar Fawzi, Renato Renner, Thomas Vidick
Formato: article
Lenguaje:EN
Publicado: Nature Portfolio 2018
Materias:
Q
Acceso en línea:https://doaj.org/article/b145f0c07f1844859fe7a39939946b6c
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:b145f0c07f1844859fe7a39939946b6c
record_format dspace
spelling oai:doaj.org-article:b145f0c07f1844859fe7a39939946b6c2021-12-02T16:56:58ZPractical device-independent quantum cryptography via entropy accumulation10.1038/s41467-017-02307-42041-1723https://doaj.org/article/b145f0c07f1844859fe7a39939946b6c2018-01-01T00:00:00Zhttps://doi.org/10.1038/s41467-017-02307-4https://doaj.org/toc/2041-1723The security of DIQKD is difficult to prove, as one needs to take into account every possible attack strategy. Here, the authors develop a method to determine the entropy of a system as the sum of the entropies of its parts. Applied to DIQKD, this implies that it suffices to consider i.i.d. attacks.Rotem Arnon-FriedmanFrédéric DupuisOmar FawziRenato RennerThomas VidickNature PortfolioarticleScienceQENNature Communications, Vol 9, Iss 1, Pp 1-11 (2018)
institution DOAJ
collection DOAJ
language EN
topic Science
Q
spellingShingle Science
Q
Rotem Arnon-Friedman
Frédéric Dupuis
Omar Fawzi
Renato Renner
Thomas Vidick
Practical device-independent quantum cryptography via entropy accumulation
description The security of DIQKD is difficult to prove, as one needs to take into account every possible attack strategy. Here, the authors develop a method to determine the entropy of a system as the sum of the entropies of its parts. Applied to DIQKD, this implies that it suffices to consider i.i.d. attacks.
format article
author Rotem Arnon-Friedman
Frédéric Dupuis
Omar Fawzi
Renato Renner
Thomas Vidick
author_facet Rotem Arnon-Friedman
Frédéric Dupuis
Omar Fawzi
Renato Renner
Thomas Vidick
author_sort Rotem Arnon-Friedman
title Practical device-independent quantum cryptography via entropy accumulation
title_short Practical device-independent quantum cryptography via entropy accumulation
title_full Practical device-independent quantum cryptography via entropy accumulation
title_fullStr Practical device-independent quantum cryptography via entropy accumulation
title_full_unstemmed Practical device-independent quantum cryptography via entropy accumulation
title_sort practical device-independent quantum cryptography via entropy accumulation
publisher Nature Portfolio
publishDate 2018
url https://doaj.org/article/b145f0c07f1844859fe7a39939946b6c
work_keys_str_mv AT rotemarnonfriedman practicaldeviceindependentquantumcryptographyviaentropyaccumulation
AT fredericdupuis practicaldeviceindependentquantumcryptographyviaentropyaccumulation
AT omarfawzi practicaldeviceindependentquantumcryptographyviaentropyaccumulation
AT renatorenner practicaldeviceindependentquantumcryptographyviaentropyaccumulation
AT thomasvidick practicaldeviceindependentquantumcryptographyviaentropyaccumulation
_version_ 1718382700266520576