Prospects for device-independent quantum key distribution
- URL: http://arxiv.org/abs/2111.11769v3
- Date: Sat, 25 May 2024 15:54:15 GMT
- Title: Prospects for device-independent quantum key distribution
- Authors: Ernest Y. -Z. Tan,
- Abstract summary: Device-independent quantum key distribution (DIQKD) aims to achieve secure key distribution with only minimal assumptions.
We present security proofs for several techniques that help to improve the keyrates and noise tolerance of DIQKD.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Device-independent quantum key distribution (DIQKD) aims to achieve secure key distribution with only minimal assumptions, by basing its security on the violation of Bell inequalities. While this offers strong security guarantees, it comes at the cost of being challenging to implement experimentally. In this thesis, we present security proofs for several techniques that help to improve the keyrates and noise tolerance of DIQKD, such as noisy preprocessing, random key measurements, and advantage distillation. We also show finite-size security proofs for some protocols based on combining several of these techniques. These results and proof techniques should be useful for further development of DIQKD protocols.
Related papers
- Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Efficient source-independent quantum conference key agreement [25.617190829449893]
Quantum conference key agreement (QCKA) enables the unconditional secure distribution of conference keys among multiple participants.
We propose a source-independent QCKA scheme utilizing the post-matching method.
We introduce an equivalent distributing virtual multi-photon entanglement protocol for providing the unconditional security proof.
arXiv Detail & Related papers (2024-06-25T04:24:06Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - The Quantum Chernoff Divergence in Advantage Distillation for QKD and
DIQKD [0.0]
Device-independent quantum key distribution (DIQKD) aims to mitigate adversarial exploitation of imperfections in quantum devices.
We present an alternative proof structure that replaces the fidelity with the quantum Chernoff divergence.
Our results provide insight into a fundamental question in quantum information theory regarding the circumstances under which DIQKD is possible.
arXiv Detail & Related papers (2022-12-14T01:44:23Z) - Improved coherent one-way quantum key distribution for high-loss
channels [0.0]
We present a simple variant of COW-QKD and prove its security in the infinite-key limit.
Remarkably, the resulting key rate of our protocol is comparable with both the existing upper-bound on COW-QKD key rate and the secure key rate of the coherent-state BB84 protocol.
arXiv Detail & Related papers (2022-06-17T00:07:03Z) - Upper bounds on key rates in device-independent quantum key distribution
based on convex-combination attacks [1.118478900782898]
We present the convex-combination attack as an efficient, easy-to-use technique for upper-bounding DIQKD key rates.
It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols.
arXiv Detail & Related papers (2022-06-13T15:27:48Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Improved DIQKD protocols with finite-size analysis [2.940150296806761]
We show that positive randomness is achievable up to depolarizing noise values of $9.33%$, exceeding all previously known noise thresholds.
We also develop a modification to random-key-measurement protocols, using a pre-shared seed followed by a "seed recovery" step.
arXiv Detail & Related papers (2020-12-16T03:04:19Z) - Tight finite-key analysis for generalized high-dimensional quantum key
distribution [23.578892457164933]
We propose a tight finite-key analysis suitable for generalized high-dimensional quantum key distribution protocols.
Benefitting from our theory, high-dimensional quantum key distribution protocols with finite resources become experimentally feasible.
arXiv Detail & Related papers (2020-08-08T12:33:53Z) - Quantum key distribution with correlated sources [1.7499351967216341]
In theory, quantum key distribution (QKD) offers information-theoretic security.
In practice, however, it does not due to discrepancies between the assumptions used in the security proofs and the behaviour of the real apparatuses.
Here, we close this gap by introducing a simple yet general method to prove the security of QKD with arbitrarily long-range pulse correlations.
arXiv Detail & Related papers (2019-08-22T09:05:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.