Fully device-independent conference key agreement

Jérémy Ribeiro, Gláucia Murta, and Stephanie Wehner
Phys. Rev. A 97, 022307 – Published 6 February 2018

Abstract

We present a security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests [specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality], and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N-partite MABK inequality and the Clauser-Horne-Shimony-Holt (CHSH) inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N1. We compare the asymptotic key rate for device-independent conference key agreement (DICKA) to the case where the parties use N1 device-independent quantum key distribution protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.

  • Figure
  • Figure
  • Received 23 August 2017

DOI:https://doi.org/10.1103/PhysRevA.97.022307

©2018 American Physical Society

Physics Subject Headings (PhySH)

Quantum Information, Science & Technology

Authors & Affiliations

Jérémy Ribeiro, Gláucia Murta, and Stephanie Wehner

  • QuTech, Delft University of Technology, Lorentzweg 1, NL-2628 CJ Delft, The Netherlands

Comments & Replies

Reply to “Comment on ‘Fully device-independent conference key agreement' ”

Jérémy Ribeiro, Gláucia Murta, and Stephanie Wehner
Phys. Rev. A 100, 026302 (2019)

Comment on “Fully device-independent conference key agreement”

Timo Holz, Daniel Miller, Hermann Kampermann, and Dagmar Bruß
Phys. Rev. A 100, 026301 (2019)

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 97, Iss. 2 — February 2018

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review A

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×