2021
DOI: 10.22331/q-2021-04-26-443
|View full text |Cite
|
Sign up to set email alerts
|

Device-independent quantum key distribution with asymmetric CHSH inequalities

Abstract: The simplest device-independent quantum key distribution protocol is based on the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality and allows two users, Alice and Bob, to generate a secret key if they observe sufficiently strong correlations. There is, however, a mismatch between the protocol, in which only one of Alice's measurements is used to generate the key, and the CHSH expression, which is symmetric with respect to Alice's two measurements. We therefore investigate the impact of using an extended famil… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

8
112
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 44 publications
(120 citation statements)
references
References 30 publications
8
112
0
Order By: Relevance
“…It is therefore very likely that a similar advantage can be gained for this system. It has, however, recently been proven that the security of some generalised DIQKD pro-tocols involving non-maximally entangled states can be bounded to a similar threshold as the CHSH inequality [26,27]. It is thus unclear if a similar advantage can also be obtained for DIQKD.…”
Section: Discussionmentioning
confidence: 99%
“…It is therefore very likely that a similar advantage can be gained for this system. It has, however, recently been proven that the security of some generalised DIQKD pro-tocols involving non-maximally entangled states can be bounded to a similar threshold as the CHSH inequality [26,27]. It is thus unclear if a similar advantage can also be obtained for DIQKD.…”
Section: Discussionmentioning
confidence: 99%
“…This again follows by identifying A 1 and Ā1 with the Z and X operators and reusing a one-sided deviceindependent bound known for BB84 with noisy preprocessing [12,18].…”
Section: B Bb84-type Uncertainty Relationsmentioning
confidence: 99%
“…The two above bounds were used in [12] to analyze the security of a family of CHSH-based DIQKD protocols. But more generally, it is also possible to obtain other bounds, such as the two ones below, which we will apply to other variants of CHSH-based DIQKD protocols in Section III.…”
Section: B Bb84-type Uncertainty Relationsmentioning
confidence: 99%
See 2 more Smart Citations