Seedless Extractors for Device-Independent Quantum Cryptography
- URL: http://arxiv.org/abs/2403.04713v1
- Date: Thu, 7 Mar 2024 18:07:52 GMT
- Title: Seedless Extractors for Device-Independent Quantum Cryptography
- Authors: Cameron Foreman and Lluis Masanes
- Abstract summary: Device-independent (DI) quantum cryptography aims at providing secure cryptography with minimal trust in, or characterisation of, the underlying quantum devices.
An essential step in DI protocols is randomness extraction (or privacy amplification) which requires the honest parties to have a seed of additional bits with sufficient entropy and statistical independence of any bits generated during the protocol.
In this work we introduce a method for extraction in DI protocols which does not require a seed and is secure against computationally unbounded quantum adversary.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Device-independent (DI) quantum cryptography aims at providing secure
cryptography with minimal trust in, or characterisation of, the underlying
quantum devices. An essential step in DI protocols is randomness extraction (or
privacy amplification) which requires the honest parties to have a seed of
additional bits with sufficient entropy and statistical independence of any
bits generated during the protocol. In this work we introduce a method for
extraction in DI protocols which does not require a seed and is secure against
computationally unbounded quantum adversary. The key idea is to use the Bell
violation of the raw data, instead of its min-entropy, as the extractor
promise.
Related papers
- Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - Generating Hard Ising Instances With Planted Solutions Using
Post-Quantum Cryptographic Protocols [0.3522950356329992]
We present a novel method to generate hard instances with planted solutions based on the public-private McEliece post-quantum cryptographic protocol.
Our protocol is suitable to test and evaluate quantum devices without the risk of "backdoors" being exploited.
arXiv Detail & Related papers (2023-08-18T17:55:37Z) - Entropy Accumulation under Post-Quantum Cryptographic Assumptions [4.416484585765028]
In device-independent (DI) quantum protocols, the security statements are oblivious to the characterization of the quantum apparatus.
We present a flexible framework for proving the security of such protocols by utilizing a combination of tools from quantum information theory.
arXiv Detail & Related papers (2023-07-02T12:52:54Z) - Single-photon-memory measurement-device-independent quantum secure
direct communication [63.75763893884079]
Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
arXiv Detail & Related papers (2022-12-12T02:23:57Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Certified Random Number Generation from Quantum Steering [1.0820909926464386]
Certified randomness protocols have been developed which remove the need for trust in devices by taking advantage of nonlocality.
Here, we use a photonic platform to implement our protocol, which operates in the quantum steering scenario.
We demonstrate an approach for a steering-based generator of public or private randomness, and the first generation of certified random bits, with the detection loophole closed.
arXiv Detail & Related papers (2021-11-18T03:49:43Z) - Semi-device-independent full randomness amplification based on energy
bounds [0.0]
Quantum Bell nonlocality allows for the design of protocols that amplify the randomness of public and arbitrarily biased Santha-Vazirani sources.
We prove that full randomness amplification can be achieved without requiring a complete characterization of entanglement states and measurements.
arXiv Detail & Related papers (2021-08-20T10:34:01Z) - Sample-efficient device-independent quantum state verification and
certification [68.8204255655161]
Authentication of quantum sources is a crucial task in building reliable and efficient protocols for quantum-information processing.
We develop a systematic approach to device-independent verification of quantum states free of IID assumptions in the finite copy regime.
We show that device-independent verification can be performed with optimal sample efficiency.
arXiv Detail & Related papers (2021-05-12T17:48:04Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Bell nonlocality is not sufficient for the security of standard
device-independent quantum key distribution protocols [1.9573380763700712]
Device-independent quantum key distribution is a secure quantum cryptographic paradigm that allows two honest users to establish a secret key.
We show that no protocol of this form allows for establishing a secret key when implemented on any correlation obtained by measuring local projective measurements.
arXiv Detail & Related papers (2021-03-03T19:10:06Z) - Source Independent Quantum Walk Random Number Generation [1.827510863075184]
Source independent quantum random number generators (SI-QRNG) are cryptographic protocols.
We analyze an SI-QRNG protocol based on quantum walks and develop a new proof technique to show security.
arXiv Detail & Related papers (2021-02-03T19:42:57Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.