Bell nonlocality is not sufficient for the security of standard
device-independent quantum key distribution protocols
- URL: http://arxiv.org/abs/2103.02639v2
- Date: Mon, 2 Aug 2021 17:33:58 GMT
- Title: Bell nonlocality is not sufficient for the security of standard
device-independent quantum key distribution protocols
- Authors: M\'at\'e Farkas, Maria Balanz\'o-Juand\'o, Karol {\L}ukanowski, Jan
Ko{\l}ody\'nski, Antonio Ac\'in
- Abstract summary: Device-independent quantum key distribution is a secure quantum cryptographic paradigm that allows two honest users to establish a secret key.
We show that no protocol of this form allows for establishing a secret key when implemented on any correlation obtained by measuring local projective measurements.
- Score: 1.9573380763700712
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Device-independent quantum key distribution is a secure quantum cryptographic
paradigm that allows two honest users to establish a secret key, while putting
minimal trust in their devices. Most of the existing protocols have the
following structure: first, a bipartite nonlocal quantum state is distributed
between the honest users, who perform local measurements to establish nonlocal
correlations. Then, they announce the implemented measurements and extract a
secure key by post-processing their measurement outcomes. We show that no
protocol of this form allows for establishing a secret key when implemented on
any correlation obtained by measuring local projective measurements on certain
entangled nonlocal states, namely on a range of entangled two-qubit Werner
states. To prove this result, we introduce a technique for upper-bounding the
asymptotic key rate of device-independent quantum key distribution protocols,
based on a simple eavesdropping attack. Our results imply that either different
reconciliation techniques are needed for device-independent quantum key
distribution in the large-noise regime, or Bell nonlocality is not sufficient
for this task.
Related papers
- Guarantees on the structure of experimental quantum networks [109.08741987555818]
Quantum networks connect and supply a large number of nodes with multi-party quantum resources for secure communication, networked quantum computing and distributed sensing.
As these networks grow in size, certification tools will be required to answer questions regarding their properties.
We demonstrate a general method to guarantee that certain correlations cannot be generated in a given quantum network.
arXiv Detail & Related papers (2024-03-04T19:00:00Z) - Almost device-independent certification of GME states with minimal
measurements [41.94295877935867]
Device-independent certification of quantum states allows the characterization of quantum states present inside a device.
A major problem in this regard is to certify quantum states using minimal resources.
We consider the multipartite quantum steering scenario with an arbitrary number of parties but only one of which is trusted in the sense that the measurements performed by the trusted party are known.
arXiv Detail & Related papers (2024-02-28T17:54:55Z) - Unbounded device-independent quantum key rates from arbitrarily small
non-locality [0.0]
Device-independent quantum key distribution allows for proving the security of a shared cryptographic key.
Recent results show that Bell non-locality is in general not sufficient for standard device-independent quantum key distribution.
We show that from certain correlations that exhibit arbitrarily small non-locality, one can still extract device-independent key rates.
arXiv Detail & Related papers (2023-10-12T18:00:11Z) - Device-independent quantum key distribution with arbitrarily small nonlocality [0.8192907805418583]
Device-independent quantum key distribution (DIQKD) allows two users to set up shared cryptographic key without the need to trust the quantum devices used.
Here we show that no such bound exists, giving schemes that achieve key with correlations arbitrarily close to the local set.
Some of our constructions achieve the maximum of 1 bit of key per pair of entangled qubits.
arXiv Detail & Related papers (2023-09-18T10:34:56Z) - Hierarchical certification of non-classical network correlations [54.9796002159688]
We derive linear and non-linear Bell-like inequalities for networks, whose violation certifies the absence of a minimum number of classical sources in them.
We do so, without assuming that nature is ultimately governed by quantum mechanics, providing a hierarchy interpolating between network nonlocality and full network nonlocality.
arXiv Detail & Related papers (2023-06-27T18:00:01Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Experimental device-independent quantum key distribution between distant
users [2.673057393751639]
Device-independent quantum key distribution (DIQKD) is the art of using untrusted devices to establish secret keys over an untrusted channel.
Here, we demonstrate for the first time the distribution of a secure key in a fully device-independent way between two users separated by 400 metres.
arXiv Detail & Related papers (2021-10-01T17:59:02Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - A coherence-witnessing game and applications to semi-device-independent
quantum key distribution [1.024113475677323]
We introduce a coherence-based, semi-device-independent, semi-quantum key distribution protocol built upon a noise-robust version of a coherence equality game.
Security is proven in the bounded quantum storage model, requiring users to implement only classical operations.
arXiv Detail & Related papers (2021-03-11T17:55:34Z) - Discrete-phase-randomized measurement-device-independent quantum key
distribution [1.3706331473063877]
We show that there are loopholes for imperfect phase randomization in measurement-device-independent quantum key distribution.
We propose a discrete-phase-randomized measurement-device-independent quantum key distribution protocol as a solution to close this source-side loophole.
arXiv Detail & Related papers (2020-06-22T03:10:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.