{"title":"密码博弈中的非定域蒸馏","authors":"G. Brassard, Benno Salwey, S. Wolf","doi":"10.1109/ITW.2015.7133124","DOIUrl":null,"url":null,"abstract":"Besides being one of the most puzzling aspects of quantum information theory, non-locality has been recognised as a valuable resource for various cryptographic protocols. We study the phenomenon of distillation of non-locality, which is the ability to generate a stronger instance of non-locality from weaker ones. We construct an eavesdropping third party who gains knowledge about the outputs of distillation protocols. This knowledge directly implies an upper bound on the degree of non-locality of the output of the protocol.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Non-locality distillation as cryptographic game\",\"authors\":\"G. Brassard, Benno Salwey, S. Wolf\",\"doi\":\"10.1109/ITW.2015.7133124\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Besides being one of the most puzzling aspects of quantum information theory, non-locality has been recognised as a valuable resource for various cryptographic protocols. We study the phenomenon of distillation of non-locality, which is the ability to generate a stronger instance of non-locality from weaker ones. We construct an eavesdropping third party who gains knowledge about the outputs of distillation protocols. This knowledge directly implies an upper bound on the degree of non-locality of the output of the protocol.\",\"PeriodicalId\":174797,\"journal\":{\"name\":\"2015 IEEE Information Theory Workshop (ITW)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE Information Theory Workshop (ITW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITW.2015.7133124\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Information Theory Workshop (ITW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITW.2015.7133124","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Besides being one of the most puzzling aspects of quantum information theory, non-locality has been recognised as a valuable resource for various cryptographic protocols. We study the phenomenon of distillation of non-locality, which is the ability to generate a stronger instance of non-locality from weaker ones. We construct an eavesdropping third party who gains knowledge about the outputs of distillation protocols. This knowledge directly implies an upper bound on the degree of non-locality of the output of the protocol.