Receiver-Device-Independent Quantum Key Distribution Protocols
- URL: http://arxiv.org/abs/2111.04351v2
- Date: Fri, 8 Jul 2022 09:25:13 GMT
- Title: Receiver-Device-Independent Quantum Key Distribution Protocols
- Authors: Marie Ioannou, Pavel Sekatski, Alastair A. Abbott, Denis Rosset,
Jean-Daniel Bancal, and Nicolas Brunner
- Abstract summary: We discuss quantum key distribution protocols and their security analysis.
In particular, we show that a secret key can be established even when the quantum channel has arbitrarily low transmission.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We discuss quantum key distribution protocols and their security analysis,
considering a receiver-device-independent (RDI) model. The sender's (Alice's)
device is partially characterized, in the sense that we assume bounds on the
overlaps of the prepared quantum states. The receiver's (Bob's) device requires
no characterisation and can be represented as a black-box. Our protocols are
therefore robust to any attack on Bob, such as blinding attacks. In particular,
we show that a secret key can be established even when the quantum channel has
arbitrarily low transmission by considering RDI protocols exploiting
sufficiently many states. Finally, we discuss how the hypothesis of bounded
overlaps can be naturally applied to practical devices.
Related papers
- Orthogonal-state-based Measurement Device Independent Quantum Communication [32.244698777387995]
We propose a new protocol of measurement-device-independent quantum secure direct communication and quantum dialogue employing single basis, i.e., Bell basis as decoy qubits for eavesdropping detection.
Our protocols leverage fundamentally distinct resources to close the security loopholes linked to measurement devices, while also effectively doubling the distance for secure direct message transmission.
arXiv Detail & Related papers (2024-09-30T15:57:17Z) - Simulations of distributed-phase-reference quantum key distribution protocols [0.1398098625978622]
Quantum key distribution protocols provide a secret key between two users with security guaranteed by the laws of quantum mechanics.
We perform simulations on the Interconnect platform to characterise the practical implementation of these devices.
We briefly describe and simulate some possible eavesdropping attempts, backflash attack, trojan-horse attack and detector-blinding attack exploiting the device imperfections.
arXiv Detail & Related papers (2024-06-13T13:19:04Z) - Decoherence-assisted quantum key distribution [37.69303106863453]
We show that our method reduces the amount of information that an eavesdropper can obtain in the BB84 protocol under the entangling probe attack.
We demonstrate experimentally that Alice and Bob can agree on a scheme to that gives low values of the quantum bit error rate.
arXiv Detail & Related papers (2024-05-30T15:28:07Z) - Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - Entropy Accumulation under Post-Quantum Cryptographic Assumptions [4.416484585765028]
In device-independent (DI) quantum protocols, the security statements are oblivious to the characterization of the quantum apparatus.
We present a flexible framework for proving the security of such protocols by utilizing a combination of tools from quantum information theory.
arXiv Detail & Related papers (2023-07-02T12:52:54Z) - Single-photon-memory measurement-device-independent quantum secure
direct communication [63.75763893884079]
Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
arXiv Detail & Related papers (2022-12-12T02:23:57Z) - Resource analysis for quantum-aided Byzantine agreement with the four-qubit singlet state [1.2094859111770522]
In distributed computing, a Byzantine fault is a condition where a component behaves inconsistently, showing different symptoms to different components of the system.
Our work highlights important engineering aspects of the future deployment of quantum communication protocols with multi-qubit entangled states.
arXiv Detail & Related papers (2022-07-11T15:17:58Z) - Succinct Classical Verification of Quantum Computation [30.91621630752802]
We construct a classically succinct interactive argument for quantum computation (BQP)
Our protocol is secure assuming the post-quantum security of indistinguishability obfuscation (iO) and Learning Errors (LWE)
arXiv Detail & Related papers (2022-06-29T22:19:12Z) - Sample-efficient device-independent quantum state verification and
certification [68.8204255655161]
Authentication of quantum sources is a crucial task in building reliable and efficient protocols for quantum-information processing.
We develop a systematic approach to device-independent verification of quantum states free of IID assumptions in the finite copy regime.
We show that device-independent verification can be performed with optimal sample efficiency.
arXiv Detail & Related papers (2021-05-12T17:48:04Z) - Receiver-Device-Independent Quantum Key Distribution [0.0]
We present protocols for quantum key distribution in a prepare-and-measure setup with an asymmetric level of trust.
The protocols are immune to attacks on the receiver's device, such as blinding attacks.
We report a proof-of-principle demonstration, involving mostly off-the-shelf equipment, as well as a high-efficiency superconducting nanowire detector.
arXiv Detail & Related papers (2021-04-29T18:01:09Z) - Device-independent quantum key distribution from computational
assumptions [7.006301658267124]
We show how to replace the no-communication assumption in DIQKD.
We give a protocol that produces secure keys even when the components of an adversarial device can exchange arbitrary quantum communication.
arXiv Detail & Related papers (2020-10-08T18:00:04Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.