Practical device-independent quantum cryptography via entropy accumulation
The security of DIQKD is difficult to prove, as one needs to take into account every possible attack strategy. Here, the authors develop a method to determine the entropy of a system as the sum of the entropies of its parts. Applied to DIQKD, this implies that it suffices to consider i.i.d. attacks.
Guardado en:
Autores principales: | Rotem Arnon-Friedman, Frédéric Dupuis, Omar Fawzi, Renato Renner, Thomas Vidick |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Nature Portfolio
2018
|
Materias: | |
Acceso en línea: | https://doaj.org/article/b145f0c07f1844859fe7a39939946b6c |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Ejemplares similares
-
Computing conditional entropies for quantum correlations
por: Peter Brown, et al.
Publicado: (2021) -
Experimental authentication of quantum key distribution with post-quantum cryptography
por: Liu-Jun Wang, et al.
Publicado: (2021) -
Lightweight Cryptography for the Encryption of Data Communication of IoT Devices
por: Ivan Sokol, et al.
Publicado: (2021) -
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography
por: Tim Fritzmann, et al.
Publicado: (2021) -
An Enhanced Energy Efficient Lightweight Cryptography Method for various IoT devices
por: Prakasam P., et al.
Publicado: (2021)