4.2 Article

No-go theorem for device-independent security in relativistic causal theories

Journal

PHYSICAL REVIEW RESEARCH
Volume 3, Issue 3, Pages -

Publisher

AMER PHYSICAL SOC
DOI: 10.1103/PhysRevResearch.3.033146

Keywords

-

Funding

  1. Comision Nacional de Investigacion Ciencia y Tecnologia (CONICYT) Programa de Formacion Capital Humano Avanzado/Beca de Postdoctorado en el extranjero (BECAS CHILE) [74160002]
  2. John Templeton Foundation
  3. Foundation for Polish Science under the grant TEAM-NET project [POIR.04.04.00-00-17C1/18-00]
  4. National Science Center [2015/18/E/ST2/00327]
  5. Foundation for Polish Science (IRAP project, ICTQT) [2018/MAB/5]
  6. EU within Smart Growth Operational Programme
  7. University of Hong Kong [166DRRAVI]
  8. Seed Fund Security of Relativistic Quantum Cryptography [201909185030]
  9. Early Career Scheme (ECS) grant Device-Independent Random Number Generation and Quantum Key Distribution with Weak Random Seeds [27210620]
  10. Grant FONDECYT Iniciacion, Chile [11180474]
  11. NCN [2016/23/N/ST2/02817, 2014/14/E/ST2/00020]

Ask authors/readers for more resources

A fundamental question in device-independent quantum cryptography is the determination of the minimal physical principle for the security of cryptographic protocols. The principle of relativistic causality has been considered a candidate for certification of device-independent security, but recent studies show that it is not sufficient. While the no-signaling constraints are necessary but not sufficient for relativistic causality, a refined set of constraints has been proposed to capture the notion more precisely.
A fundamental question in device-independent quantum cryptography is to determine the minimal physical principle upon which the security of such a cryptographic protocol (such as for key distribution or for randomness generation) may be based. Since the seminal work on device-independent quantum key distribution by J. Barrett, L. Hardy, and A. Kent [Phys. Rev. Lett. 95, 010503 (2005)], a conjectured candidate for certification of deviceindependent security has been the principle of relativistic causality, namely the disallowance of causal loops. While this principle has thus far been equated with the no-signaling constraints, it has been shown recently that in multiparty Bell scenarios, the no-signaling constraints are sufficient but not necessary for relativistic causality, and a refined set of constraints has been proposed that more precisely capture the notion of relativistic causality. In this paper, we build upon this finding to show that, in contrast to the no-signaling constraints, the constraints of relativistic causality are not sufficient for certification of device-independent security. More specifically, we show that there exist correlations allowed by the causality principle that allow an adversary to gain complete information about the measurement outcomes of honest parties in any device-independent cryptographic protocol, thereby rendering the protocol completely insecure. As a tool to develop this adversarial attack strategy, we fully characterize the set of correlations allowed by relativistic causality in the tripartite Bell scenario of three parties, each performing two binary measurements, that may be of independent interest. We also demonstrate the difference between the relativistic causal correlations and those allowed by the usual nosignaling constraints by presenting explicit communication tasks wherein the two sets exhibit striking difference in their respective winning probabilities.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available