Receiver-Device-Independent Quantum Key Distribution
- URL: http://arxiv.org/abs/2104.14574v3
- Date: Wed, 18 May 2022 08:14:38 GMT
- Title: Receiver-Device-Independent Quantum Key Distribution
- Authors: Marie Ioannou, Maria Ana Pereira, Davide Rusca, Fadri Gr\"unenfelder,
Alberto Boaron, Matthieu Perrenoud, Alastair A. Abbott, Pavel Sekatski,
Jean-Daniel Bancal, Nicolas Maring, Hugo Zbinden, Nicolas Brunner
- Abstract summary: We present protocols for quantum key distribution in a prepare-and-measure setup with an asymmetric level of trust.
The protocols are immune to attacks on the receiver's device, such as blinding attacks.
We report a proof-of-principle demonstration, involving mostly off-the-shelf equipment, as well as a high-efficiency superconducting nanowire detector.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We present protocols for quantum key distribution in a prepare-and-measure
setup with an asymmetric level of trust. While the device of the sender (Alice)
is partially characterized, the receiver's (Bob's) device is treated as a
black-box. The security of the protocols is based on the assumption that
Alice's prepared states have limited overlaps, but no explicit bound on the
Hilbert space dimension is required. The protocols are immune to attacks on the
receiver's device, such as blinding attacks. The users can establish a secret
key while continuously monitoring the correct functioning of their devices
through observed statistics. We report a proof-of-principle demonstration,
involving mostly off-the-shelf equipment, as well as a high-efficiency
superconducting nanowire detector. A positive key rate is demonstrated over a
4.8 km low-loss optical fiber with finite-key analysis. The prospects of
implementing these protocols over longer distances is discussed.
Related papers
- Decoherence-assisted quantum key distribution [37.69303106863453]
We show that our method reduces the amount of information that an eavesdropper can obtain in the BB84 protocol under the entangling probe attack.
We demonstrate experimentally that Alice and Bob can agree on a scheme to that gives low values of the quantum bit error rate.
arXiv Detail & Related papers (2024-05-30T15:28:07Z) - Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - Experimental Implementation of A Quantum Zero-Knowledge Proof for User
Authentication [0.39845810840390733]
A new interactive quantum zero-knowledge protocol for identity authentication is proposed and demonstrated.
The protocol design involves a verifier and a prover knowing a pre-shared secret, and the acceptance or rejection of the proof is determined by the quantum bit error rate.
arXiv Detail & Related papers (2024-01-17T19:00:00Z) - Efficient Device-Independent Quantum Key Distribution [4.817429789586127]
Device-independent quantum key distribution (DIQKD) is a key distribution scheme whose security is based on the laws of quantum physics.
We propose an efficient device-independent quantum key distribution protocol in which one participant prepares states and transmits them to another participant.
arXiv Detail & Related papers (2023-11-16T13:01:34Z) - Entropy Accumulation under Post-Quantum Cryptographic Assumptions [4.416484585765028]
In device-independent (DI) quantum protocols, the security statements are oblivious to the characterization of the quantum apparatus.
We present a flexible framework for proving the security of such protocols by utilizing a combination of tools from quantum information theory.
arXiv Detail & Related papers (2023-07-02T12:52:54Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Single-photon-memory measurement-device-independent quantum secure
direct communication [63.75763893884079]
Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
arXiv Detail & Related papers (2022-12-12T02:23:57Z) - Receiver-Device-Independent Quantum Key Distribution Protocols [0.0]
We discuss quantum key distribution protocols and their security analysis.
In particular, we show that a secret key can be established even when the quantum channel has arbitrarily low transmission.
arXiv Detail & Related papers (2021-11-08T09:12:41Z) - Fault-tolerant parity readout on a shuttling-based trapped-ion quantum
computer [64.47265213752996]
We experimentally demonstrate a fault-tolerant weight-4 parity check measurement scheme.
We achieve a flag-conditioned parity measurement single-shot fidelity of 93.2(2)%.
The scheme is an essential building block in a broad class of stabilizer quantum error correction protocols.
arXiv Detail & Related papers (2021-07-13T20:08:04Z) - Sample-efficient device-independent quantum state verification and
certification [68.8204255655161]
Authentication of quantum sources is a crucial task in building reliable and efficient protocols for quantum-information processing.
We develop a systematic approach to device-independent verification of quantum states free of IID assumptions in the finite copy regime.
We show that device-independent verification can be performed with optimal sample efficiency.
arXiv Detail & Related papers (2021-05-12T17:48:04Z) - Asymptotic security analysis of teleportation based quantum cryptography [0.0]
We prove that the teleportation based quantum cryptography protocol presented in [Opt. Commun 283, 184] is secure against all types of individual and collective attacks.
We then investigate modifications to that protocol leading to greater secret-key rates and to security against coherent attacks.
arXiv Detail & Related papers (2020-02-10T17:54:15Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.