Practical device-independent quantum cryptography via entropy accumulation
The security of DIQKD is difficult to prove, as one needs to take into account every possible attack strategy. Here, the authors develop a method to determine the entropy of a system as the sum of the entropies of its parts. Applied to DIQKD, this implies that it suffices to consider i.i.d. attacks.
Guardado en:
Autores principales: | , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Nature Portfolio
2018
|
Materias: | |
Acceso en línea: | https://doaj.org/article/b145f0c07f1844859fe7a39939946b6c |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:b145f0c07f1844859fe7a39939946b6c |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:b145f0c07f1844859fe7a39939946b6c2021-12-02T16:56:58ZPractical device-independent quantum cryptography via entropy accumulation10.1038/s41467-017-02307-42041-1723https://doaj.org/article/b145f0c07f1844859fe7a39939946b6c2018-01-01T00:00:00Zhttps://doi.org/10.1038/s41467-017-02307-4https://doaj.org/toc/2041-1723The security of DIQKD is difficult to prove, as one needs to take into account every possible attack strategy. Here, the authors develop a method to determine the entropy of a system as the sum of the entropies of its parts. Applied to DIQKD, this implies that it suffices to consider i.i.d. attacks.Rotem Arnon-FriedmanFrédéric DupuisOmar FawziRenato RennerThomas VidickNature PortfolioarticleScienceQENNature Communications, Vol 9, Iss 1, Pp 1-11 (2018) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Science Q |
spellingShingle |
Science Q Rotem Arnon-Friedman Frédéric Dupuis Omar Fawzi Renato Renner Thomas Vidick Practical device-independent quantum cryptography via entropy accumulation |
description |
The security of DIQKD is difficult to prove, as one needs to take into account every possible attack strategy. Here, the authors develop a method to determine the entropy of a system as the sum of the entropies of its parts. Applied to DIQKD, this implies that it suffices to consider i.i.d. attacks. |
format |
article |
author |
Rotem Arnon-Friedman Frédéric Dupuis Omar Fawzi Renato Renner Thomas Vidick |
author_facet |
Rotem Arnon-Friedman Frédéric Dupuis Omar Fawzi Renato Renner Thomas Vidick |
author_sort |
Rotem Arnon-Friedman |
title |
Practical device-independent quantum cryptography via entropy accumulation |
title_short |
Practical device-independent quantum cryptography via entropy accumulation |
title_full |
Practical device-independent quantum cryptography via entropy accumulation |
title_fullStr |
Practical device-independent quantum cryptography via entropy accumulation |
title_full_unstemmed |
Practical device-independent quantum cryptography via entropy accumulation |
title_sort |
practical device-independent quantum cryptography via entropy accumulation |
publisher |
Nature Portfolio |
publishDate |
2018 |
url |
https://doaj.org/article/b145f0c07f1844859fe7a39939946b6c |
work_keys_str_mv |
AT rotemarnonfriedman practicaldeviceindependentquantumcryptographyviaentropyaccumulation AT fredericdupuis practicaldeviceindependentquantumcryptographyviaentropyaccumulation AT omarfawzi practicaldeviceindependentquantumcryptographyviaentropyaccumulation AT renatorenner practicaldeviceindependentquantumcryptographyviaentropyaccumulation AT thomasvidick practicaldeviceindependentquantumcryptographyviaentropyaccumulation |
_version_ |
1718382700266520576 |