Limits of privacy amplification against nonsignaling memory attacks

Rotem Arnon-Friedman and Amnon Ta-Shma
Phys. Rev. A 86, 062333 – Published 27 December 2012

Abstract

The task of privacy amplification, in which Alice holds some partially secret information with respect to an adversary Eve and wishes to distill it until it is completely secret, is known to be solvable almost optimally in both the classical and quantum worlds. Unfortunately, when considering an adversary who is limited only by nonsignaling constraints such a statement cannot be made in general. We here consider systems which violate the chained Bell inequality and prove that under the natural assumptions of a time-ordered nonsignaling system, which allow past subsystems to signal future subsystems (using the device's memory for example), superpolynomial privacy amplification by any hashing is impossible. This is of great relevance when considering practical device-independent key-distribution protocols which assume a superquantum adversary.

  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Received 7 November 2012

DOI:https://doi.org/10.1103/PhysRevA.86.062333

©2012 American Physical Society

Authors & Affiliations

Rotem Arnon-Friedman and Amnon Ta-Shma

  • The Blavatnik School of Computer Science, Tel-Aviv University, Tel-Aviv, Israel

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 86, Iss. 6 — December 2012

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review A

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×