Job openings & fellowships Job openings
Select Page
Seminars
March 17, 2011
MARCIN PAWLOWSKI 'Semi-Device-Independent Security of One-Way Quantum Key Distribution'

MARCIN PAWLOWSKI 'Semi-Device-Independent Security of One-Way Quantum Key Distribution'

MARCIN PAWLOWSKI
Seminar, March 17, 2011, 15:00. Seminar Room
MARCIN PAWLOWSKI
Department of Mathematics
University Walk, Clifton, Bristol, UNITED KINGDOM
By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being ’device-independent’. Here we ask whether such a strong form of security could also be established for one-way QKD. While fully device-independent security is impossible, we show that security can be guaranteed against collective attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are non-characterized, but the dimensionality of the quantum systems used in the protocol is assumed to be bounded. Our security proof relies on the analogies between one-way QKD, dimension witnesses and random-access codes.


Seminar, March 17, 2011, 15:00. Seminar Room

Hosted by Prof. Antonio Acín
Seminars
March 17, 2011
MARCIN PAWLOWSKI 'Semi-Device-Independent Security of One-Way Quantum Key Distribution'

MARCIN PAWLOWSKI 'Semi-Device-Independent Security of One-Way Quantum Key Distribution'

MARCIN PAWLOWSKI
Seminar, March 17, 2011, 15:00. Seminar Room
MARCIN PAWLOWSKI
Department of Mathematics
University Walk, Clifton, Bristol, UNITED KINGDOM
By testing nonlocality, the security of entanglement-based quantum key distribution (QKD) can be enhanced to being ’device-independent’. Here we ask whether such a strong form of security could also be established for one-way QKD. While fully device-independent security is impossible, we show that security can be guaranteed against collective attacks in a semi-device-independent scenario. In the latter, the devices used by the trusted parties are non-characterized, but the dimensionality of the quantum systems used in the protocol is assumed to be bounded. Our security proof relies on the analogies between one-way QKD, dimension witnesses and random-access codes.


Seminar, March 17, 2011, 15:00. Seminar Room

Hosted by Prof. Antonio Acín