File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Article: No-go theorem for device-independent security in relativistic causal theories

TitleNo-go theorem for device-independent security in relativistic causal theories
Authors
Issue Date2021
PublisherAmerican Physical Society. The Journal's web site is located at https://journals.aps.org/prresearch/
Citation
Physical Review Research, 2021, v. 3, p. article no. 033146 How to Cite?
AbstractA fundamental question in device-independent quantum cryptography is to determine the minimal physical principle upon which the security of such a cryptographic protocol (such as for key distribution or for randomness generation) may be based. Since the seminal work on device-independent quantum key distribution by J. Barrett, L. Hardy, and A. Kent [Phys. Rev. Lett. 95, 010503 (2005)], a conjectured candidate for certification of device-independent security has been the principle of relativistic causality, namely the disallowance of causal loops. While this principle has thus far been equated with the no-signaling constraints, it has been shown recently that in multiparty Bell scenarios, the no-signaling constraints are sufficient but not necessary for relativistic causality, and a refined set of constraints has been proposed that more precisely capture the notion of relativistic causality. In this paper, we build upon this finding to show that, in contrast to the no-signaling constraints, the constraints of relativistic causality are not sufficient for certification of device-independent security. More specifically, we show that there exist correlations allowed by the causality principle that allow an adversary to gain complete information about the measurement outcomes of honest parties in any device-independent cryptographic protocol, thereby rendering the protocol completely insecure. As a tool to develop this adversarial attack strategy, we fully characterize the set of correlations allowed by relativistic causality in the tripartite Bell scenario of three parties, each performing two binary measurements, that may be of independent interest. We also demonstrate the difference between the relativistic causal correlations and those allowed by the usual no-signaling constraints by presenting explicit communication tasks wherein the two sets exhibit striking difference in their respective winning probabilities.
Persistent Identifierhttp://hdl.handle.net/10722/306566
ISSN
2023 Impact Factor: 3.5
2023 SCImago Journal Rankings: 1.689
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorSalazar, R-
dc.contributor.authorKamon, M-
dc.contributor.authorHorodecki, K-
dc.contributor.authorGoyeneche, D-
dc.contributor.authorSaha, D-
dc.contributor.authorRamanathan, R-
dc.contributor.authorHorodecki, P-
dc.date.accessioned2021-10-22T07:36:28Z-
dc.date.available2021-10-22T07:36:28Z-
dc.date.issued2021-
dc.identifier.citationPhysical Review Research, 2021, v. 3, p. article no. 033146-
dc.identifier.issn2643-1564-
dc.identifier.urihttp://hdl.handle.net/10722/306566-
dc.description.abstractA fundamental question in device-independent quantum cryptography is to determine the minimal physical principle upon which the security of such a cryptographic protocol (such as for key distribution or for randomness generation) may be based. Since the seminal work on device-independent quantum key distribution by J. Barrett, L. Hardy, and A. Kent [Phys. Rev. Lett. 95, 010503 (2005)], a conjectured candidate for certification of device-independent security has been the principle of relativistic causality, namely the disallowance of causal loops. While this principle has thus far been equated with the no-signaling constraints, it has been shown recently that in multiparty Bell scenarios, the no-signaling constraints are sufficient but not necessary for relativistic causality, and a refined set of constraints has been proposed that more precisely capture the notion of relativistic causality. In this paper, we build upon this finding to show that, in contrast to the no-signaling constraints, the constraints of relativistic causality are not sufficient for certification of device-independent security. More specifically, we show that there exist correlations allowed by the causality principle that allow an adversary to gain complete information about the measurement outcomes of honest parties in any device-independent cryptographic protocol, thereby rendering the protocol completely insecure. As a tool to develop this adversarial attack strategy, we fully characterize the set of correlations allowed by relativistic causality in the tripartite Bell scenario of three parties, each performing two binary measurements, that may be of independent interest. We also demonstrate the difference between the relativistic causal correlations and those allowed by the usual no-signaling constraints by presenting explicit communication tasks wherein the two sets exhibit striking difference in their respective winning probabilities.-
dc.languageeng-
dc.publisherAmerican Physical Society. The Journal's web site is located at https://journals.aps.org/prresearch/-
dc.relation.ispartofPhysical Review Research-
dc.rightsCopyright [2021] by The American Physical Society. This article is available online at [http://dx.doi.org/10.1103/PhysRevResearch.3.033146].-
dc.rightsThis work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.-
dc.titleNo-go theorem for device-independent security in relativistic causal theories-
dc.typeArticle-
dc.identifier.emailRamanathan, R: ravi@cs.hku.hk-
dc.identifier.authorityRamanathan, R=rp02582-
dc.description.naturepublished_or_final_version-
dc.identifier.doi10.1103/PhysRevResearch.3.033146-
dc.identifier.scopuseid_2-s2.0-85113887160-
dc.identifier.hkuros328740-
dc.identifier.volume3-
dc.identifier.spagearticle no. 033146-
dc.identifier.epagearticle no. 033146-
dc.identifier.isiWOS:000685123900001-
dc.publisher.placeUnited States-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats