Simple and tight device-independent security proofs

dc.contributor.authorArnon-Friedman, Rotemen_ZA
dc.contributor.authorRenner, Renatoen_ZA
dc.contributor.authorVidick, Thomasen_ZA
dc.date.accessioned2021-11-10T14:11:56Z
dc.date.available2021-11-10T14:11:56Z
dc.date.issued2019-02-26
dc.descriptionCITATION: Arnon-Friedman, R., Renner, R. & Vidick, T. 2019. Simple and tight device-independent security proofs. SIAM Journal on Computing, 48(1), 181–225. doi:10.1137/18M1174726
dc.descriptionThe original publication is available at https://epubs.siam.org/loi/smjcat
dc.description.abstractDevice-independent security is the gold standard for quantum cryptography: not only is security based entirely on the laws of quantum mechanics, but it holds irrespective of any a priori assumptions on the quantum devices used in a protocol, making it particularly applicable in a quantum-wary environment. While the existence of device-independent protocols for tasks such as randomness expansion and quantum key distribution has recently been established, the underlying proofs of security remain very challenging, yield rather poor key rates, and demand very high quality quantum devices, thus making them all but impossible to implement in practice. We introduce a technique for the analysis of device-independent cryptographic protocols. We provide a flexible protocol and give a security proof that provides quantitative bounds that are asymptotically tight, even in the presence of general quantum adversaries. At a high level our approach amounts to establishing a reduction to the scenario in which the untrusted device operates in an identical and independent way in each round of the protocol. This is achieved by leveraging the sequential nature of the protocol and makes use of a newly developed tool, the “entropy accumulation theorem” of Dupuis, Fawzi, and Renner [Entropy Accumulation, preprint, 2016]. As concrete applications we give simple and modular security proofs for device-independent quantum key distribution and randomness expansion protocols based on the CHSH inequality. For both tasks, we establish essentially optimal asymptotic key rates and noise tolerance. In view of recent experimental progress, which has culminated in loophole-free Bell tests, it is likely that these protocols can be practically implemented in the near future.en_ZA
dc.description.urihttps://epubs.siam.org/doi/abs/10.1137/18M1174726?mobileUi=0
dc.description.versionPublisher’s version
dc.format.extent45 pages
dc.identifier.citationArnon-Friedman, R., Renner, R. & Vidick, T. 2019. Simple and tight device-independent security proofs. SIAM Journal on Computing, 48(1), 181–225. doi:10.1137/18M1174726
dc.identifier.issn1095-7111 (online)
dc.identifier.issn0097-5397 (print)
dc.identifier.otherdoi:10.1137/18M1174726
dc.identifier.urihttp://hdl.handle.net/10019.1/123419
dc.language.isoen_ZAen_ZA
dc.publisherSociety for Industrial and Applied Mathematics
dc.rights.holderSociety for Industrial and Applied Mathematics
dc.subjectQuantum cryptography -- Security measuresen_ZA
dc.subjectDevice independent security proofsen_ZA
dc.subjectAsymptotic analysisen_ZA
dc.subjectSecurity proofsen_ZA
dc.subjectRandom variablesen_ZA
dc.titleSimple and tight device-independent security proofsen_ZA
dc.typeArticleen_ZA
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
arnonfriedman_simple_2019.pdf
Size:
697.07 KB
Format:
Adobe Portable Document Format
Description:
Download article
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: