Skip to main content Accessibility help
Internet Explorer 11 is being discontinued by Microsoft in August 2021. If you have difficulties viewing the site on Internet Explorer 11 we recommend using a different browser such as Microsoft Edge, Google Chrome, Apple Safari or Mozilla Firefox.

Chapter 9: Quantum Cryptography Using Untrusted Devices

Chapter 9: Quantum Cryptography Using Untrusted Devices

pp. 218-240

Authors

, California Institute of Technology, USA, , Delft University of Technology, The Netherlands
Resources available Unlock the full potential of this textbook with additional resources. There are free resources and Instructor restricted resources available for this textbook. Explore resources
  • Add bookmark
  • Cite
  • Share

Extract

In this chapter we introduce a variant of the BB’84 quantum key distribution protocol, the E’91 protocol due to Ekert. We show that this protocol achieves a higher level of security called “device independent security.” What this means, informally, is that the new protocol’s security doesn’t rely on Alice and Bob performing trusted measurements on their qubit in each round. We sketch the proof of security of the E’91 protocol, which rests on the property of entanglement monogamy.

Keywords

  • Entanglement-based QKD
  • Ekert protocol
  • entanglement monogamy
  • device independence

About the book

Access options

Review the options below to login to check your access.

Purchase options

eTextbook
US$59.99
Hardback
US$59.99

Have an access code?

To redeem an access code, please log in with your personal login.

If you believe you should have access to this content, please contact your institutional librarian or consult our FAQ page for further information about accessing our content.

Also available to purchase from these educational ebook suppliers