4.6 Article

Device independence for two-party cryptography and position verification with memoryless devices

期刊

PHYSICAL REVIEW A
卷 97, 期 6, 页码 -

出版社

AMER PHYSICAL SOC
DOI: 10.1103/PhysRevA.97.062307

关键词

-

资金

  1. STW
  2. NWO VIDI
  3. ERC Starting Grant
  4. National Research Foundation, Prime Minister's Office, Singapore
  5. Ministry of Education, Singapore under the Research Centres of Excellence programme
  6. Ministry of Education, Singapore

向作者/读者索取更多资源

Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. Unfortunately, security of these protocols is not possible against an all powerful adversary. However, if we impose some realistic physical constraints on the adversary, there exist protocols for which security can be proven, but these so far relied on the knowledge of the quantum operations performed during the protocols. In this work we improve the device-independent security proofs of Kaniewski andWehner [New J. Phys. 18, 055004 (2016)] for two-party cryptography (with memoryless devices) and we add a security proof for device-independent position verification (also memoryless devices) under different physical constraints on the adversary. We assess the quality of the devices by observing a Bell violation, and, as for Kaniewski and Wehner [New J. Phys. 18, 055004 (2016)], security can be attained for any violation of the Clauser-Holt-Shimony-Horne inequality.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据