Papers
Topics
Authors
Recent
Detailed Answer
Quick Answer
Concise responses based on abstracts only
Detailed Answer
Well-researched responses based on abstracts and relevant paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses
Gemini 2.5 Flash
Gemini 2.5 Flash 86 tok/s
Gemini 2.5 Pro 49 tok/s Pro
GPT-5 Medium 17 tok/s Pro
GPT-5 High 14 tok/s Pro
GPT-4o 88 tok/s Pro
GPT OSS 120B 471 tok/s Pro
Kimi K2 207 tok/s Pro
2000 character limit reached

Device-independent secret key rates via a post-selected Bell inequality (2111.04482v1)

Published 8 Nov 2021 in quant-ph

Abstract: In device-independent quantum key distribution (DIQKD) the security is not based on any assumptions about the intrinsic properties of the devices and the quantum signals, but on the violation of a Bell inequality. We introduce a DIQKD scenario in which an optimal Bell inequality is constructed from the performed measurement data, rather than fixing beforehand a specific Bell inequality. Our method can be employed in a general way, for any number of measurement settings and any number of outcomes. We provide an implementable DIQKD protocol and perform finite-size security key analysis for collective attacks. We compare our approach with related procedures in the literature and analyze the robustness of our protocol. We also study the performance of our method in several Bell scenarios as well as for random measurement settings.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Summary

We haven't generated a summary for this paper yet.

Ai Generate Text Spark Streamline Icon: https://streamlinehq.com

Paper Prompts

Sign up for free to create and run prompts on this paper using GPT-5.

Dice Question Streamline Icon: https://streamlinehq.com

Follow-up Questions

We haven't generated follow-up questions for this paper yet.