Acín Antonio, Brunner Nicolas, Gisin Nicolas, Massar Serge, Pironio Stefano, Scarani Valerio
ICFO-Institut de Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels (Barcelona), Spain.
Phys Rev Lett. 2007 Jun 8;98(23):230501. doi: 10.1103/PhysRevLett.98.230501. Epub 2007 Jun 4.
We present the optimal collective attack on a quantum key distribution protocol in the "device-independent" security scenario, where no assumptions are made about the way the quantum key distribution devices work or on what quantum system they operate. Our main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.
我们展示了在“与设备无关”的安全场景下对量子密钥分发协议的最优集体攻击,在这种场景中,不对量子密钥分发设备的工作方式或它们所操作的量子系统做任何假设。我们的主要结果是,根据贝尔型不等式的违背量,给出了授权方之一与窃听者之间 Holevo 信息的一个紧密界限。