Clauser–Horne–Shimony–Holt versus three-party pseudo-telepathy: on the optimal number of samples in device-independent quantum private query
In device-independent (DI) paradigm, the trustful assumptions over the devices are removed and CHSH test is performed to check the functionality of the devices toward certifying the security of the protocol. The existing DI protocols consider infinite number of samples from theoretical point of view, though this is not practically implementable. For finite sample analysis of the existing DI protocols, we may also consider strategies for checking device independence other than the CHSH test. In this direction, here we present a comparative analysis between CHSH and three-party Pseudo-telepathy game for the quantum private query protocol in DI paradigm that appeared in Maitra et al. (Phys Rev A 95:042344, 2017) very recently.
KeywordsCHSH Pseudo-telepathy QKD QPQ
The authors like to acknowledge the reviewers for their detailed comments that substantially improved the technical as well as editorial quality of this paper. The second author likes to acknowledge the grant from the project “Cryptography & Cryptanalysis: How far can we bridge the gap between Classical and Quantum Paradigm,” awarded by the Scientific Research Council of the Department of Atomic Energy (DAE-SRC), the Board of Research in Nuclear Sciences (BRNS).
- 19.Long, L.R., Li, H.W., Zhou, P., Fan, C., Yin, C.L.: Multiparty-controlled teleportation of an arbitrary GHZ-class state by using a \(d\)-dimensional \((N+2)\)-particle non-maximally entangled state as the quantum channel. Sci. China Ser. G Phys. Mech. Astron. 54, 484–490 (2011)ADSCrossRefGoogle Scholar
- 24.Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 10–12 (1984)Google Scholar
- 25.Mancinska, L.: Maximally entangled state in pseudo-telepathy games. In: Calude, C.S., Freivalds, R., Iwama, K. (eds.) Computing with new resources. Lecture Notes in Computer Science, vol. 8808, pp. 200–207 (2014)Google Scholar