No-signaling quantum key distribution: solution by linear programming
- 152 Downloads
We outline a straightforward approach for obtaining a secret key rate using only no-signaling constraints and linear programming. Assuming an individual attack, we consider all possible joint probabilities. Initially, we study only the case where Eve has binary outcomes, and we impose constraints due to the no-signaling principle and given measurement outcomes. Within the remaining space of joint probabilities, by using linear programming, we get bound on the probability of Eve correctly guessing Bob’s bit. We then make use of an inequality that relates this guessing probability to the mutual information between Bob and a more general Eve, who is not binary-restricted. Putting our computed bound together with the Csiszár–Körner formula, we obtain a positive key generation rate. The optimal value of this rate agrees with known results, but was calculated in a more straightforward way, offering the potential of generalization to different scenarios.
KeywordsNo-signaling principle Quantum key distribution Linear programming
This study was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2010-0007208), and by National Research Foundation and Ministry of Education, Singapore, and the people programme (Marie Curie Actions) of the European Union’s Seventh Framework Programme (FP7/2007-2013) under REA grant agreement N.609305. NK acknowledges the Ontario Graduate Scholarship program for support.
- 1.Bohm, D., Hiley, B.: The Undivided Universe. Routledge, London (1993). introduced in Ref. Google Scholar
- 3.Bell, J.S.: Physics 1, 195 (1964). reprinted in Ref. Google Scholar
- 8.Bennett, C.H., Brassard, G.: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, p. 175. IEEE, New York (1984)Google Scholar
- 15.With respect to physical implementation, the protocol is almost the same as the Ekert protocol . However, because security is analyzed with a different, though related, point of view, we give a new nameGoogle Scholar
- 18.Gass, S.: Linear Programming: Methods And Applications. Dover Publications, Mineola (2010)Google Scholar