A crucial assumption in the security proof of standard Quantum Key Distribution protocols is that the honest parties know how their devices work. However, it is possible to construct schemes whose security proof requires almost no assumption on the devices, but the minimal ones. We present some of these protocols together with the security analysis against individual attacks. All these schemes are based on the existence of non-local correlations, namely correlations that cannot be described by a local model.
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
Tel.: +1 703 830 6300
Fax: +1 703 830 2300 firstname.lastname@example.org
(Corporate matters and books only) IOS Press c/o Accucoms US, Inc.
For North America Sales and Customer Service
West Point Commons
Lansdale PA 19446
Tel.: +1 866 855 8967
Fax: +1 215 660 5042 email@example.com