Device-Independent Security of Quantum Cryptography against Collective Attacks

Antonio Acín, Nicolas Brunner, Nicolas Gisin, Serge Massar, Stefano Pironio, and Valerio Scarani
Phys. Rev. Lett. 98, 230501 – Published 4 June 2007

Abstract

We present the optimal collective attack on a quantum key distribution protocol in the “device-independent” security scenario, where no assumptions are made about the way the quantum key distribution devices work or on what quantum system they operate. Our main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.

  • Figure
  • Received 20 February 2007

DOI:https://doi.org/10.1103/PhysRevLett.98.230501

©2007 American Physical Society

Authors & Affiliations

Antonio Acín1,2, Nicolas Brunner3, Nicolas Gisin3, Serge Massar4, Stefano Pironio1, and Valerio Scarani3

  • 1ICFO-Institut de Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona), Spain
  • 2ICREA-Institució Catalana de Recerca i Estudis Avançats, 08010 Barcelona, Spain
  • 3Group of Applied Physics, University of Geneva, CH-1211 Geneve 4, Switzerland
  • 4Laboratoire d’information quantique, CP 225, Université Libre de Bruxelles, 1050 Brussels, Belgium

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 98, Iss. 23 — 8 June 2007

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review Letters

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×