2016
DOI: 10.1088/1367-2630/18/5/055010
|View full text |Cite|
|
Sign up to set email alerts
|

Semi device independence of the BB84 protocol

Abstract: The BB84 quantum key distribution protocol is semi device independent in the sense that it can be shown to be secure if just one of the users' devices is restricted to a qubit Hilbert space. Here, we derive an analytic lower bound on the asymptotic secret key rate for the entanglement-based version of BB84 assuming only that one of the users performs unknown qubit POVMs. The result holds against the class of collective attacks and reduces to the well known Shor-Preskill key rate for correlations corresponding … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 30 publications
0
12
0
Order By: Relevance
“…In terms of entanglement being a resource for quantum key distribution (QKD), we derive security bounds for implementations of the BB84 and the six-state protocols that use entangled qubits. Similar work was done for the BB84 protocol in [7], as well as in the recent, independent work [8]. This work fits in the broad class of 'measurement-device-independent' (MDI) approaches, in which all the imperfections of the measurement devices and detectors do not need to be modelled.…”
Section: Introductionmentioning
confidence: 62%
See 1 more Smart Citation
“…In terms of entanglement being a resource for quantum key distribution (QKD), we derive security bounds for implementations of the BB84 and the six-state protocols that use entangled qubits. Similar work was done for the BB84 protocol in [7], as well as in the recent, independent work [8]. This work fits in the broad class of 'measurement-device-independent' (MDI) approaches, in which all the imperfections of the measurement devices and detectors do not need to be modelled.…”
Section: Introductionmentioning
confidence: 62%
“…We find ¢ = r r BB84 BB84 : the relaxation of assumption on measurement does not affect the secret key fraction in the BB84 protocol. This result had been obtained analytically thanks to the special properties of p BB84 [7] and has been recently re-derived in a parallel work [8]. These analytical derivations are possible thanks to the high symmetry of the BB84 protocol and can in fact be made with by assuming only that Alice measures a qubit, while Bobʼs system has arbitrary dimension.…”
Section: Application To the Bb84 And Six-states Protocolsmentioning
confidence: 84%
“…Concentrating on qubit systems, then, we know from security analyses of the BB84 protocol (see e.g. [24] or [25,26]) that the conditional entropy of the outcome of a Pauli Z measurement by Alice is lower bounded by…”
Section: Short Derivation For Chshmentioning
confidence: 99%
“…[12] considers another SDI model, one in which only the dimension of the system is known but not the measurements, and provides tools to quantify entanglement and security proofs for QKD. [40] studies the security of BB84 under the even weaker assumption that the dimension of only one of the systems is constrained to be a qubit. [20] shows that considering higher-dimensional systems (still in the SDI model, where a bound on the dimension of the devices is given a priori) can lead to improve rates, albeit at a higher computational cost.…”
mentioning
confidence: 99%