Bipartite entanglement is sufficient for standard device-independent conference key agreement
- URL: http://arxiv.org/abs/2503.21290v1
- Date: Thu, 27 Mar 2025 09:13:26 GMT
- Title: Bipartite entanglement is sufficient for standard device-independent conference key agreement
- Authors: Lewis Wooltorton, Peter Brown, Roger Colbeck,
- Abstract summary: Conference key agreement (CKA) aims to establish shared, private randomness among many separated parties in a network.<n>DICKA protocols fall into two categories: those that rely on violating a joint Bell inequality, and those that many bipartite protocols.
- Score: 0.8192907805418583
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Conference key agreement (CKA) aims to establish shared, private randomness among many separated parties in a network. Device-independent (DI) CKA is a variant in which no assumptions are placed on the nature of the source, or the measurements performed by each party. So far, DICKA protocols largely fall into two categories: those that rely on violating a joint Bell inequality using genuinely multi-partite entangled states, and those that concatenate many bipartite protocols. The question of whether a hybrid protocol exists, where a multi-partite Bell inequality can be violated using only bipartite entanglement, was asked by Grasselli et al. in [Quantum 7, 980, (2023)]. We answer this question affirmatively, by constructing an asymptotically secure DICKA protocol achieving the same rate as the concatenation of bipartite DIQKD, yet relying on a single joint Bell violation. Our results prompt further discussion on the benefits of multi-partite entanglement for DICKA over its bipartite alternative, and we give an overview of different arguments for near-term devices.
Related papers
- Experimental anonymous quantum conferencing [72.27323884094953]
We experimentally implement the AQCKA task in a six-user quantum network using Greenberger-Horne-Zeilinger (GHZ)-state entanglement.
We also demonstrate that the protocol retains an advantage in a four-user scenario with finite key effects taken into account.
arXiv Detail & Related papers (2023-11-23T19:00:01Z) - Multipartite entanglement theory with entanglement-nonincreasing
operations [91.3755431537592]
We extend the resource theory of entanglement for multipartite systems beyond the standard framework of local operations and classical communication.
We demonstrate that in this adjusted framework, the transformation rates between multipartite states are fundamentally dictated by the bipartite entanglement entropies of the respective quantum states.
arXiv Detail & Related papers (2023-05-30T12:53:56Z) - Bell inequalities with overlapping measurements [52.81011822909395]
We study Bell inequalities where measurements of different parties can have overlap.
This allows to accommodate problems in quantum information.
The scenarios considered show an interesting behaviour with respect to Hilbert space dimension, overlap, and symmetry.
arXiv Detail & Related papers (2023-03-03T18:11:05Z) - Boosting device-independent cryptography with tripartite nonlocality [0.0]
Device-independent (DI) protocols certify private randomness by observing nonlocal correlations when two or more parties test a Bell inequality.
Here, we consider tripartite DICKA and DIRE protocols based on testing multipartite Bell inequalities.
We show that DICKA and DIRE protocols employing tripartite Bell inequalities can significantly outperform their bipartite counterparts.
arXiv Detail & Related papers (2022-09-26T16:35:03Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Single-state multi-party semiquantum key agreement protocol based on
multi-particle GHZ entangled states [3.312385039704987]
We propose a single-state three-party semiquantum key agreement (SQKA) protocol with three-particle GHZ entangled states first.
Detailed security analysis turns out that the proposed single-state three-party SQKA protocol is secure against several famous attacks from an outside eavesdropper.
arXiv Detail & Related papers (2021-12-11T00:13:16Z) - Multipartite Intrinsic Non-Locality and Device-Independent Conference Key Agreement [3.187381965457262]
We introduce multipartite intrinsic non-locality as a method for quantifying resources in the multipartite scenario of device-independent (DI) conference key agreement.
We prove that multipartite intrinsic non-locality is additive, convex, and monotone under a class of free operations called local operations and common randomness.
arXiv Detail & Related papers (2021-11-04T02:42:36Z) - Entanglement purification by counting and locating errors with
entangling measurements [62.997667081978825]
We consider entanglement purification protocols for multiple copies of qubit states.
We use high-dimensional auxiliary entangled systems to learn about number and positions of errors in the noisy ensemble.
arXiv Detail & Related papers (2020-11-13T19:02:33Z) - Entropy bounds for multiparty device-independent cryptography [0.0]
We show that genuine multipartite entanglement is necessary to certify the privacy of a party's outcome.
We obtain the entropy bounds thanks to two general results of independent interest.
arXiv Detail & Related papers (2020-04-29T15:22:57Z) - Quantum Conference Key Agreement: A Review [0.0]
Multipartite key distribution is a cryptographic task where more than two parties wish to establish a common secret key.
Here, we review the existing quantum CKA protocols based on multipartite entanglement.
arXiv Detail & Related papers (2020-03-23T11:29:24Z) - Constructing Multipartite Bell inequalities from stabilizers [21.98685929768227]
We propose a systematical framework to construct Bell inequalities from stabilizers maximally violated by general stabilizer states.
We show that the constructed Bell inequalities can self-test any stabilizer state which is essentially device-independent.
Our framework can not only inspire more fruitful multipartite Bell inequalities from conventional verification methods, but also pave the way for their practical applications.
arXiv Detail & Related papers (2020-02-05T16:07:11Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.