Single-photon based Quantum Key Distribution and Random Number
Generation schemes and their device-independent security analysis
- URL: http://arxiv.org/abs/2311.07451v1
- Date: Mon, 13 Nov 2023 16:32:02 GMT
- Title: Single-photon based Quantum Key Distribution and Random Number
Generation schemes and their device-independent security analysis
- Authors: Konrad Schlichtholz, Bianka Woloncewicz, Tamoghna Das, Marcin
Markiewicz, Marek \.Zukowski
- Abstract summary: We present a device-independent quantum key distribution scheme secure even against no-signaling eavesdropping.
The scheme is inspired by the Tan-Walls-Collett (1991) interferometric setup, which used the entangled state of two exit modes of a 50-50 beamsplitter.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We present a single-photon based device-independent quantum key distribution
scheme secure even against no-signaling eavesdropping, which covers quantum
attacks, as well as ones beyond laws of physics but still obeying the rules for
spatially separated events. The operational scheme is inspired by the
Tan-Walls-Collett (1991) interferometric setup, which used the entangled state
of two exit modes of a 50-50 beamsplitter resulting from a single photon
entering one of its input ports, and weak homodyne measurements at two
spatially separated measurement stations. The physics and non-classically of
such an arrangement has been understood only recently. Our protocol links basic
features of the first two emblematic protocols, BB84 and Ekert91, namely the
random bits of the cryptographic key are obtained by measurements on single
photon, while the security is positively tested if one observes a violation of
a specific Bell inequality. The security analysis presented here is based on a
decomposition of the correlations into extremal points of a no-signaling
polytope which allows for identification of the optimal strategy for any
eavesdropping constrained only by the no-signalling principle. For this
strategy, the key rate is calculated, which is then connected with the
violation of a specific Clauser-Horne inequality. We also adapt this analysis
to propose a self-testing quantum random number generator.
Related papers
- Pilot-reference-free continuous-variable quantum key distribution with
efficient decoy-state analysis [4.738999541025475]
Continuous-variable quantum key distribution (CV QKD) using optical coherent detectors is practically favorable.
Security analysis and parameter estimation of CV QKD are complicated due to the infinite-dimensional latent Hilbert space.
We present a time-bin-encoding CV protocol with a simple phase-error-based security analysis valid under general coherent attacks.
arXiv Detail & Related papers (2023-09-07T15:40:05Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Experimental certification of more than one bit of quantum randomness in
the two inputs and two outputs scenario [0.0]
We present an experimental realization of recent Bell-type operators designed to provide private random numbers that are secure against adversaries with quantum resources.
We use semi-definite programming to provide lower bounds on the generated randomness in terms of both min-entropy and von Neumann entropy.
Our results demonstrate the first experiment that certifies close to two bits of randomness from binary measurements of two parties.
arXiv Detail & Related papers (2023-03-13T20:42:53Z) - Suppressing Amplitude Damping in Trapped Ions: Discrete Weak
Measurements for a Non-unitary Probabilistic Noise Filter [62.997667081978825]
We introduce a low-overhead protocol to reverse this degradation.
We present two trapped-ion schemes for the implementation of a non-unitary probabilistic filter against amplitude damping noise.
This filter can be understood as a protocol for single-copy quasi-distillation.
arXiv Detail & Related papers (2022-09-06T18:18:41Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Single-photon nonlocality in quantum networks [55.41644538483948]
We show that the nonlocality of single-photon entangled states can nevertheless be revealed in a quantum network made only of beamsplitters and photodetectors.
Our results show that single-photon entanglement may constitute a promising solution to generate genuine network-nonlocal correlations useful for Bell-based quantum information protocols.
arXiv Detail & Related papers (2021-08-03T20:13:24Z) - Hybrid no-signaling-quantum correlations [0.2085467441379275]
We introduce and study an intermediate hybrid no-signaling quantum set of non-local correlations that we term $textbfHNSQ$ in the multi-party Bell scenario.
Specifically, the set $textbfHNSQ$ is a super-quantum set of correlations derived from no-signaling assemblages.
In contrast to the usual no-signaling correlations, the new set allows for simple security of (one-sided)-device-independent applications against super-quantum adversaries.
arXiv Detail & Related papers (2021-07-14T17:40:42Z) - Observation-dependent suppression and enhancement of two-photon
coincidences by tailored losses [68.8204255655161]
Hong-Ou-Mandel (HOM) effect can lead to a perfect suppression of two-particle coincidences between the output ports of a balanced beam splitter.
In this work, we demonstrate experimentally that the two-particle coincidence statistics of two bosons can instead be seamlessly tuned to substantial enhancement.
Our findings reveal a new approach to harnessing non-Hermitian settings for the manipulation of multi-particle quantum states.
arXiv Detail & Related papers (2021-05-12T06:47:35Z) - Bell nonlocality is not sufficient for the security of standard
device-independent quantum key distribution protocols [1.9573380763700712]
Device-independent quantum key distribution is a secure quantum cryptographic paradigm that allows two honest users to establish a secret key.
We show that no protocol of this form allows for establishing a secret key when implemented on any correlation obtained by measuring local projective measurements.
arXiv Detail & Related papers (2021-03-03T19:10:06Z) - Single photon randomness originating from the symmetry of dipole
emission and the unpredictability of spontaneous emission [55.41644538483948]
Quantum random number generation is a key ingredient for quantum cryptography and fundamental quantum optics.
We experimentally demonstrate quantum random number generation based on the spontaneous emission process.
The scheme can be extended to random number generation by coherent single photons with potential applications in solid-state based quantum communication at room temperature.
arXiv Detail & Related papers (2021-02-18T14:07:20Z) - Single trusted qubit is necessary and sufficient for quantum realisation
of extremal no-signaling correlations [0.2085467441379275]
We show that quantum statistics can never reproduce an extremal non-local point within the set of no-signaling boxes.
We prove a positive result showing that already a single trusted qubit is enough for quantum theory to produce a self-testable extremal point.
arXiv Detail & Related papers (2020-04-30T13:52:01Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.