Back to Search Start Over

Fully device independent Conference Key Agreement

Authors :
Ribeiro, Jérémy
Murta, Gláucia
Wehner, Stephanie
Source :
Phys. Rev. A 97, 022307 (2018)
Publication Year :
2017

Abstract

We present the first security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented {by any experimental setup} that is capable of performing Bell tests (specifically, we introduce the "Parity-CHSH" inequality), and security can in principle be obtained for any violation of the Parity-CHSH inequality. We use a direct connection between the $N$-partite Parity-CHSH inequality and the CHSH inequality. Namely, the Parity-CHSH inequality can be considered as a CHSH inequality or another CHSH inequality (equivalent up to relabelling) depending on the parity of the output of $N-2$ of the parties. We compare the asymptotic key rate for DICKA to the case where the parties use $N-1$ DIQKD protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.<br />Comment: 6+17 pages, 1 figure. v2: This update addresses the comment made in [arXiv:1906.01710]. v3: corrected typo in equations (A.65) and (11)

Subjects

Subjects :
Quantum Physics

Details

Database :
arXiv
Journal :
Phys. Rev. A 97, 022307 (2018)
Publication Type :
Report
Accession number :
edsarx.1708.00798
Document Type :
Working Paper
Full Text :
https://doi.org/10.1103/PhysRevA.97.022307