Ask a Question

Prefer a chat interface with context about you and your work?

Simple and practical DIQKD security analysis via BB84-type uncertainty relations and Pauli correlation constraints

Simple and practical DIQKD security analysis via BB84-type uncertainty relations and Pauli correlation constraints

According to the entropy accumulation theorem, proving the unconditional security of a device-independent quantum key distribution protocol reduces to deriving tradeoff functions, i.e., bounds on the single-round von Neumann entropy of the raw key as a function of Bell linear functionals, conditioned on an eavesdropper's quantum side information. In this …