• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

计算量子关联的条件熵。

Computing conditional entropies for quantum correlations.

作者信息

Brown Peter, Fawzi Hamza, Fawzi Omar

机构信息

Univ Lyon, ENS Lyon, UCBL, CNRS, LIP, F-69342, Lyon, Cedex 07, France.

DAMTP, University of Cambridge, Cambridge, UK.

出版信息

Nat Commun. 2021 Jan 25;12(1):575. doi: 10.1038/s41467-020-20018-1.

DOI:10.1038/s41467-020-20018-1
PMID:33495446
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7835250/
Abstract

The rates of quantum cryptographic protocols are usually expressed in terms of a conditional entropy minimized over a certain set of quantum states. In particular, in the device-independent setting, the minimization is over all the quantum states jointly held by the adversary and the parties that are consistent with the statistics that are seen by the parties. Here, we introduce a method to approximate such entropic quantities. Applied to the setting of device-independent randomness generation and quantum key distribution, we obtain improvements on protocol rates in various settings. In particular, we find new upper bounds on the minimal global detection efficiency required to perform device-independent quantum key distribution without additional preprocessing. Furthermore, we show that our construction can be readily combined with the entropy accumulation theorem in order to establish full finite-key security proofs for these protocols.

摘要

量子密码协议的速率通常用在某组量子态上最小化的条件熵来表示。特别地,在与设备无关的设定中,最小化是在对手和各方共同持有的、与各方所观察到的统计数据一致的所有量子态上进行的。在此,我们引入一种方法来近似此类熵量。应用于与设备无关的随机性生成和量子密钥分发的设定中,我们在各种情况下提高了协议速率。特别地,我们找到了在无需额外预处理的情况下执行与设备无关的量子密钥分发所需的最小全局检测效率的新上限。此外,我们表明我们的构造可以很容易地与熵积累定理相结合,以便为这些协议建立完整的有限密钥安全性证明。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dcc2/7835250/dcd1a4c80576/41467_2020_20018_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dcc2/7835250/1f8d249449fc/41467_2020_20018_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dcc2/7835250/19381844373f/41467_2020_20018_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dcc2/7835250/03e893e1f6f0/41467_2020_20018_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dcc2/7835250/9a167ab226a9/41467_2020_20018_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dcc2/7835250/abc2735a612e/41467_2020_20018_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dcc2/7835250/dcd1a4c80576/41467_2020_20018_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dcc2/7835250/1f8d249449fc/41467_2020_20018_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dcc2/7835250/19381844373f/41467_2020_20018_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dcc2/7835250/03e893e1f6f0/41467_2020_20018_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dcc2/7835250/9a167ab226a9/41467_2020_20018_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dcc2/7835250/abc2735a612e/41467_2020_20018_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dcc2/7835250/dcd1a4c80576/41467_2020_20018_Fig6_HTML.jpg

相似文献

1
Computing conditional entropies for quantum correlations.计算量子关联的条件熵。
Nat Commun. 2021 Jan 25;12(1):575. doi: 10.1038/s41467-020-20018-1.
2
Noisy Preprocessing Facilitates a Photonic Realization of Device-Independent Quantum Key Distribution.噪声预处理助力设备无关量子密钥分发的光子实现。
Phys Rev Lett. 2020 Jun 12;124(23):230502. doi: 10.1103/PhysRevLett.124.230502.
3
Bell Nonlocality Is Not Sufficient for the Security of Standard Device-Independent Quantum Key Distribution Protocols.贝尔非定域性不足以保障标准设备无关量子密钥分发协议的安全性。
Phys Rev Lett. 2021 Jul 30;127(5):050503. doi: 10.1103/PhysRevLett.127.050503.
4
On the security of semi-device-independent QKD protocols.关于半设备无关量子密钥分发协议的安全性。
Quantum Inf Process. 2018;17(6):131. doi: 10.1007/s11128-018-1892-z. Epub 2018 Apr 21.
5
Device-Independent Bounds on Detection Efficiency.检测效率的与设备无关的界限。
Phys Rev Lett. 2017 Jun 30;118(26):260401. doi: 10.1103/PhysRevLett.118.260401. Epub 2017 Jun 27.
6
Angle-angular-momentum entropic bounds and optimal entropies for quantum scattering of spinless particles.无自旋粒子量子散射的角-角动量熵界与最优熵
Phys Rev E Stat Phys Plasmas Fluids Relat Interdiscip Topics. 1999 Nov;60(5 Pt A):5261-74. doi: 10.1103/physreve.60.5261.
7
Unbounded Device-Independent Quantum Key Rates from Arbitrarily Small Nonlocality.源自任意小非定域性的无界设备无关量子密钥率
Phys Rev Lett. 2024 May 24;132(21):210803. doi: 10.1103/PhysRevLett.132.210803.
8
Quantum Complementarity Approach to Device-Independent Security.基于量子互补性的设备无关安全性方法。
Phys Rev Lett. 2023 Oct 6;131(14):140801. doi: 10.1103/PhysRevLett.131.140801.
9
Upper Bounds on Device-Independent Quantum Key Distribution.
Phys Rev Lett. 2021 Apr 23;126(16):160501. doi: 10.1103/PhysRevLett.126.160501.
10
Security of quantum key distribution from generalised entropy accumulation.基于广义熵积累的量子密钥分发安全性
Nat Commun. 2023 Aug 29;14(1):5272. doi: 10.1038/s41467-023-40920-8.

引用本文的文献

1
Entanglement and quantum discord in the cavity QED models.腔量子电动力学模型中的纠缠与量子失协
Heliyon. 2024 Dec 16;11(1):e41194. doi: 10.1016/j.heliyon.2024.e41194. eCollection 2025 Jan 15.
2
Generalised Entropy Accumulation.广义熵积累
Commun Math Phys. 2024;405(11):261. doi: 10.1007/s00220-024-05121-4. Epub 2024 Oct 12.
3
Security of quantum key distribution from generalised entropy accumulation.基于广义熵积累的量子密钥分发安全性

本文引用的文献

1
Noisy Preprocessing Facilitates a Photonic Realization of Device-Independent Quantum Key Distribution.噪声预处理助力设备无关量子密钥分发的光子实现。
Phys Rev Lett. 2020 Jun 12;124(23):230502. doi: 10.1103/PhysRevLett.124.230502.
2
Practical device-independent quantum cryptography via entropy accumulation.通过熵积累实现实用的设备无关量子密码学。
Nat Commun. 2018 Jan 31;9(1):459. doi: 10.1038/s41467-017-02307-4.
3
Numerical approach for unstructured quantum key distribution.非结构化量子密钥分发的数值方法。
Nat Commun. 2023 Aug 29;14(1):5272. doi: 10.1038/s41467-023-40920-8.
Nat Commun. 2016 May 20;7:11712. doi: 10.1038/ncomms11712.
4
Multiple Observers Can Share the Nonlocality of Half of an Entangled Pair by Using Optimal Weak Measurements.多个观察者可以通过使用最优弱测量来共享一个纠缠对一半的非定域性。
Phys Rev Lett. 2015 Jun 26;114(25):250401. doi: 10.1103/PhysRevLett.114.250401. Epub 2015 Jun 22.
5
Random numbers certified by Bell's theorem.经贝尔定理认证的随机数。
Nature. 2010 Apr 15;464(7291):1021-4. doi: 10.1038/nature09008.
6
Quantum cryptography based on Bell's theorem.基于贝尔定理的量子密码学。
Phys Rev Lett. 1991 Aug 5;67(6):661-663. doi: 10.1103/PhysRevLett.67.661.
7
Background level and counter efficiencies required for a loophole-free Einstein-Podolsky-Rosen experiment.无漏洞爱因斯坦-波多尔斯基-罗森实验所需的背景水平和计数器效率。
Phys Rev A. 1993 Feb;47(2):R747-R750. doi: 10.1103/physreva.47.r747.