Bell nonlocality is not sufficient for the security of standard
device-independent quantum key distribution protocols
- URL: http://arxiv.org/abs/2103.02639v2
- Date: Mon, 2 Aug 2021 17:33:58 GMT
- Title: Bell nonlocality is not sufficient for the security of standard
device-independent quantum key distribution protocols
- Authors: M\'at\'e Farkas, Maria Balanz\'o-Juand\'o, Karol {\L}ukanowski, Jan
Ko{\l}ody\'nski, Antonio Ac\'in
- Abstract summary: Device-independent quantum key distribution is a secure quantum cryptographic paradigm that allows two honest users to establish a secret key.
We show that no protocol of this form allows for establishing a secret key when implemented on any correlation obtained by measuring local projective measurements.
- Score: 1.9573380763700712
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Device-independent quantum key distribution is a secure quantum cryptographic
paradigm that allows two honest users to establish a secret key, while putting
minimal trust in their devices. Most of the existing protocols have the
following structure: first, a bipartite nonlocal quantum state is distributed
between the honest users, who perform local measurements to establish nonlocal
correlations. Then, they announce the implemented measurements and extract a
secure key by post-processing their measurement outcomes. We show that no
protocol of this form allows for establishing a secret key when implemented on
any correlation obtained by measuring local projective measurements on certain
entangled nonlocal states, namely on a range of entangled two-qubit Werner
states. To prove this result, we introduce a technique for upper-bounding the
asymptotic key rate of device-independent quantum key distribution protocols,
based on a simple eavesdropping attack. Our results imply that either different
reconciliation techniques are needed for device-independent quantum key
distribution in the large-noise regime, or Bell nonlocality is not sufficient
for this task.
Related papers
- Orthogonal-state-based Measurement Device Independent Quantum Communication [32.244698777387995]
We propose a new protocol of measurement-device-independent quantum secure direct communication and quantum dialogue employing single basis, i.e., Bell basis as decoy qubits for eavesdropping detection.
Our protocols leverage fundamentally distinct resources to close the security loopholes linked to measurement devices, while also effectively doubling the distance for secure direct message transmission.
arXiv Detail & Related papers (2024-09-30T15:57:17Z) - Unconditionally secure key distribution without quantum channel [0.76146285961466]
Currently, the quantum scheme stands as the only known method for achieving unconditionally secure key distribution.
We propose another key distribution scheme with unconditional security, named probability key distribution, that promises users between any two distances to generate a fixed and high secret key rate.
Non-local entangled states can be generated, identified and measured in the equivalent virtual protocol and can be used to extract secret keys.
arXiv Detail & Related papers (2024-08-24T15:13:14Z) - Almost device-independent certification of GME states with minimal
measurements [41.94295877935867]
Device-independent certification of quantum states allows the characterization of quantum states present inside a device.
A major problem in this regard is to certify quantum states using minimal resources.
We consider the multipartite quantum steering scenario with an arbitrary number of parties but only one of which is trusted in the sense that the measurements performed by the trusted party are known.
arXiv Detail & Related papers (2024-02-28T17:54:55Z) - Unbounded device-independent quantum key rates from arbitrarily small
non-locality [0.0]
Device-independent quantum key distribution allows for proving the security of a shared cryptographic key.
Recent results show that Bell non-locality is in general not sufficient for standard device-independent quantum key distribution.
We show that from certain correlations that exhibit arbitrarily small non-locality, one can still extract device-independent key rates.
arXiv Detail & Related papers (2023-10-12T18:00:11Z) - Device-independent quantum key distribution with arbitrarily small nonlocality [0.8192907805418583]
Device-independent quantum key distribution (DIQKD) allows two users to set up shared cryptographic key without the need to trust the quantum devices used.
Here we show that no such bound exists, giving schemes that achieve key with correlations arbitrarily close to the local set.
Some of our constructions achieve the maximum of 1 bit of key per pair of entangled qubits.
arXiv Detail & Related papers (2023-09-18T10:34:56Z) - Hierarchical certification of nonclassical network correlations [50.32788626697182]
We derive linear and nonlinear Bell-like inequalities for networks, whose violation certifies the absence of a minimum number of classical sources in them.
We insert this assumption, which leads to results more amenable to certification in experiments.
arXiv Detail & Related papers (2023-06-27T18:00:01Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - A coherence-witnessing game and applications to semi-device-independent
quantum key distribution [1.024113475677323]
We introduce a coherence-based, semi-device-independent, semi-quantum key distribution protocol built upon a noise-robust version of a coherence equality game.
Security is proven in the bounded quantum storage model, requiring users to implement only classical operations.
arXiv Detail & Related papers (2021-03-11T17:55:34Z) - Discrete-phase-randomized measurement-device-independent quantum key
distribution [1.3706331473063877]
We show that there are loopholes for imperfect phase randomization in measurement-device-independent quantum key distribution.
We propose a discrete-phase-randomized measurement-device-independent quantum key distribution protocol as a solution to close this source-side loophole.
arXiv Detail & Related papers (2020-06-22T03:10:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.