Detection loophole attacks on semi-device-independent quantum and classical protocols
Visualitza/Obre
Estadístiques de LA Referencia / Recolecta
Inclou dades d'ús des de 2022
Cita com:
hdl:2117/78576
Tipus de documentArticle
Data publicació2015-01-01
EditorRinton Press
Condicions d'accésAccés obert
Llevat que s'hi indiqui el contrari, els
continguts d'aquesta obra estan subjectes a la llicència de Creative Commons
:
Reconeixement-NoComercial-SenseObraDerivada 3.0 Espanya
Abstract
Semi-device-independent quantum protocols realize information tasks – e.g. secure key
distribution, random access coding, and randomness generation – in a scenario where no
assumption on the internal working of the devices used in the protocol is made, except
their dimension. These protocols offer two main advantages: first, their implementation
is often less demanding than fully-device-independent protocols. Second, they are more
secure than their device-dependent counterparts. Their classical analogous is represented
by random access codes, which provide a general framework for describing one-sided classical
communication tasks. We discuss conditions under which detection inefficiencies can
be exploited by a malicious provider to fake the performance of semi-device-independent
quantum and classical protocols – and how to prevent it.
ISSN1533-7146
Versió de l'editorhttp://www.rintonpress.com/journals/qiconline.html#v15n12
Col·leccions
Fitxers | Descripció | Mida | Format | Visualitza |
---|---|---|---|---|
1210.1272.pdf | 189,7Kb | Visualitza/Obre |