• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

完全设备无关的量子密钥分发。

Fully device-independent quantum key distribution.

作者信息

Vazirani Umesh, Vidick Thomas

机构信息

University of California, Berkeley, California 94720, USA.

California Institute of Technology, Pasadena, California 91125, USA.

出版信息

Phys Rev Lett. 2014 Oct 3;113(14):140501. doi: 10.1103/PhysRevLett.113.140501. Epub 2014 Sep 29.

DOI:10.1103/PhysRevLett.113.140501
PMID:25325625
Abstract

Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.

摘要

量子密码学有望实现经典世界中无法复制的安全级别。即使协议所依赖的量子设备不可信,这种安全性能否得到保证?这个核心问题可以追溯到20世纪90年代初,当时首次提出了实现设备无关量子密钥分发的挑战。我们通过严格证明埃克特原始基于纠缠的协议的一个微小变体针对最一般(相干)攻击的设备无关安全性来应对这一挑战。由此产生的协议很强大:虽然只假设设备可以用量子力学定律建模,并且在空间上彼此隔离且与任何对手的实验室隔离,但它实现了线性密钥率并容忍设备中的恒定噪声率。特别是,设备可能具有量子存储器,并与窃听者共享任意量子关联。安全性证明基于对多方协议背景下量子关联一夫一妻制性质的新定量理解。

相似文献

1
Fully device-independent quantum key distribution.完全设备无关的量子密钥分发。
Phys Rev Lett. 2014 Oct 3;113(14):140501. doi: 10.1103/PhysRevLett.113.140501. Epub 2014 Sep 29.
2
Experimental quantum key distribution certified by Bell's theorem.经贝尔定理认证的实验性量子密钥分发。
Nature. 2022 Jul;607(7920):682-686. doi: 10.1038/s41586-022-04941-5. Epub 2022 Jul 27.
3
Memory attacks on device-independent quantum cryptography.对设备无关量子密码学的记忆攻击。
Phys Rev Lett. 2013 Jan 4;110(1):010503. doi: 10.1103/PhysRevLett.110.010503. Epub 2013 Jan 2.
4
Device-independent security of quantum cryptography against collective attacks.量子密码学针对集体攻击的与设备无关的安全性。
Phys Rev Lett. 2007 Jun 8;98(23):230501. doi: 10.1103/PhysRevLett.98.230501. Epub 2007 Jun 4.
5
Parallel Device-Independent Quantum Key Distribution.并行设备无关量子密钥分发
IEEE Trans Inf Theory. 2020;66(9). doi: 10.1109/tit.2020.2986740.
6
Finite-key analysis for measurement-device-independent quantum key distribution.有限密钥分析在测量设备无关量子密钥分发中的应用。
Nat Commun. 2014 Apr 29;5:3732. doi: 10.1038/ncomms4732.
7
Unbounded Device-Independent Quantum Key Rates from Arbitrarily Small Nonlocality.源自任意小非定域性的无界设备无关量子密钥率
Phys Rev Lett. 2024 May 24;132(21):210803. doi: 10.1103/PhysRevLett.132.210803.
8
Private entanglement over arbitrary distances, even using noisy apparatus.任意距离上的私密纠缠,即使使用有噪声的装置。
Phys Rev Lett. 2002 Jan 28;88(4):047902. doi: 10.1103/PhysRevLett.88.047902. Epub 2002 Jan 9.
9
Entangled state quantum cryptography: eavesdropping on the ekert protocol.纠缠态量子密码学:对埃克特协议的窃听
Phys Rev Lett. 2000 May 15;84(20):4733-6. doi: 10.1103/PhysRevLett.84.4733.
10
Counterfactual quantum key distribution with untrusted detectors.基于不可信探测器的反事实量子密钥分发
Heliyon. 2023 Feb 13;9(2):e13719. doi: 10.1016/j.heliyon.2023.e13719. eCollection 2023 Feb.

引用本文的文献

1
Analysing All-Optical Random Bit Sequences Using Gap-Based Approaches.使用基于间隙的方法分析全光随机比特序列。
Sensors (Basel). 2024 Jul 11;24(14):4474. doi: 10.3390/s24144474.
2
ChaQra: a cellular unit of the Indian quantum network.ChaQra:印度量子网络的一个细胞单元。
Sci Rep. 2024 Jul 20;14(1):16752. doi: 10.1038/s41598-024-67495-8.
3
Post-quantum cryptography and the quantum future of cybersecurity.后量子密码学与网络安全的量子未来。
Phys Rev Appl. 2024 Apr;21(4). doi: 10.1103/physrevapplied.21.040501.
4
Implementing no-signaling correlations as a service.将无信号关联作为一种服务来实现。
Sci Rep. 2024 May 10;14(1):10756. doi: 10.1038/s41598-024-59492-8.
5
Loophole-free Bell inequality violation with superconducting circuits.超导电路中的无漏洞贝尔不等式违背。
Nature. 2023 May;617(7960):265-270. doi: 10.1038/s41586-023-05885-0. Epub 2023 May 10.
6
Experimental quantum key distribution certified by Bell's theorem.经贝尔定理认证的实验性量子密钥分发。
Nature. 2022 Jul;607(7920):682-686. doi: 10.1038/s41586-022-04941-5. Epub 2022 Jul 27.
7
An Overview of Geometrical Optics Restricted Quantum Key Distribution.几何光学受限量子密钥分发概述。
Entropy (Basel). 2021 Jul 31;23(8):1003. doi: 10.3390/e23081003.
8
Device-independent quantum key distribution with random key basis.具有随机密钥基的与设备无关的量子密钥分发。
Nat Commun. 2021 May 17;12(1):2880. doi: 10.1038/s41467-021-23147-3.
9
Trading Locality for Time: Certifiable Randomness from Low-Depth Circuits.用局部性换取时间:来自低深度电路的可验证随机性
Commun Math Phys. 2021;382(1):49-86. doi: 10.1007/s00220-021-03963-w. Epub 2021 Feb 9.
10
Quantum key distribution with entangled photons generated on demand by a quantum dot.利用量子点按需生成纠缠光子的量子密钥分发。
Sci Adv. 2021 Mar 19;7(12). doi: 10.1126/sciadv.abe6379. Print 2021 Mar.