"Nonlocality-of-a-single-photon'' based Quantum Key Distribution and Random Number Generation schemes and their device-independent security analysis
- URL: http://arxiv.org/abs/2311.07451v2
- Date: Mon, 31 Mar 2025 08:00:12 GMT
- Title: "Nonlocality-of-a-single-photon'' based Quantum Key Distribution and Random Number Generation schemes and their device-independent security analysis
- Authors: Konrad Schlichtholz, Bianka Woloncewicz, Tamoghna Das, Marcin Markiewicz, Marek Żukowski,
- Abstract summary: Scheme involves a single photon 50-50 beam-split into two modes propagating to two spatially separated observation stations.<n>The physics and non-classicality of such an arrangement has been understood only recently.<n>We present a single-photon based device-independent quantum key distribution scheme secure even against no-signaling eavesdropping.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The question of ``non-locality of a single photon'', which started with a paper by Tan, Walls and Collett (TWC, 1991) stirred a thirty years long debate. This hampered attempts to use the TWC interferometric scheme in quantum cryptography. The scheme involves a single photon 50-50 beam-split into two modes propagating to two spatially separated observation stations at which weak homodyne measurements are made. The physics and non-classicality of such an arrangement has been understood only recently, and points out that an unquestionable Bell non-classicality, as was suggested by Hardy (1994), can be observed when the local measurement settings differ by the weak local oscillator being on or off, and additionally the homodyning for the on case is not balanced. Based on that, we present a single-photon based device-independent quantum key distribution scheme secure even against no-signaling eavesdropping. In our protocol the random bits of the cryptographic key are obtained by measurements on the single photon, that is for off settings at both Alice and Bob sides, while the security is positively tested if for eavesdropping testing runs one observes a violation of a specific Bell inequality involving the on and off weak homodyne measurements as alternative local settings. The security analysis presented here is based on a decomposition of the correlations into extreme points of a no-signaling polytope, which allows for identification of the optimal strategy for any eavesdropping constrained only by the no-signaling principle. For this strategy, the key rate is calculated, which is then connected with the violation of a specific Clauser-Horne inequality. We also adapt this analysis to propose a self-testing quantum random number generator based on the old idea that employs the randomness of reflection and transmission events of a quantum light impinged on a 50-50 beamsplitter.
Related papers
- Time evolution of randomness in Bell's experiment indicates 'Realism' is false [41.94295877935867]
We measure time evolution of Minimum Entropy and (estimated) Kolmogorov's Complexity of binary time series during short pulses.<n>We compare evolution between the cases with stations placed close and separated 24m in straight line.<n>This provides a clue about which one of the hypotheses necessary for the derivation and observation of Bell's inequalities is false.
arXiv Detail & Related papers (2025-04-04T20:39:15Z) - Existential Unforgeability in Quantum Authentication From Quantum Physical Unclonable Functions Based on Random von Neumann Measurement [45.386403865847235]
Physical Unclonable Functions (PUFs) leverage inherent, non-clonable physical randomness to generate unique input-output pairs.
Quantum PUFs (QPUFs) extend this concept by using quantum states as input-output pairs.
We show that random unitary QPUFs cannot achieve existential unforgeability against Quantum Polynomial Time adversaries.
We introduce a second model where the QPUF functions as a nonunitary quantum channel, which guarantees existential unforgeability.
arXiv Detail & Related papers (2024-04-17T12:16:41Z) - Pilot-reference-free continuous-variable quantum key distribution with
efficient decoy-state analysis [4.738999541025475]
Continuous-variable quantum key distribution (CV QKD) using optical coherent detectors is practically favorable.
Security analysis and parameter estimation of CV QKD are complicated due to the infinite-dimensional latent Hilbert space.
We present a time-bin-encoding CV protocol with a simple phase-error-based security analysis valid under general coherent attacks.
arXiv Detail & Related papers (2023-09-07T15:40:05Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Experimental certification of more than one bit of quantum randomness in
the two inputs and two outputs scenario [0.0]
We present an experimental realization of recent Bell-type operators designed to provide private random numbers that are secure against adversaries with quantum resources.
We use semi-definite programming to provide lower bounds on the generated randomness in terms of both min-entropy and von Neumann entropy.
Our results demonstrate the first experiment that certifies close to two bits of randomness from binary measurements of two parties.
arXiv Detail & Related papers (2023-03-13T20:42:53Z) - Suppressing Amplitude Damping in Trapped Ions: Discrete Weak
Measurements for a Non-unitary Probabilistic Noise Filter [62.997667081978825]
We introduce a low-overhead protocol to reverse this degradation.
We present two trapped-ion schemes for the implementation of a non-unitary probabilistic filter against amplitude damping noise.
This filter can be understood as a protocol for single-copy quasi-distillation.
arXiv Detail & Related papers (2022-09-06T18:18:41Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Single-photon nonlocality in quantum networks [55.41644538483948]
We show that the nonlocality of single-photon entangled states can nevertheless be revealed in a quantum network made only of beamsplitters and photodetectors.
Our results show that single-photon entanglement may constitute a promising solution to generate genuine network-nonlocal correlations useful for Bell-based quantum information protocols.
arXiv Detail & Related papers (2021-08-03T20:13:24Z) - Quantum asymmetry and noisy multi-mode interferometry [55.41644538483948]
Quantum asymmetry is a physical resource which coincides with the amount of coherence between the eigenspaces of a generator.
We show that the asymmetry may emphincrease as a result of a emphdecrease of coherence inside a degenerate subspace.
arXiv Detail & Related papers (2021-07-23T07:30:57Z) - Hybrid no-signaling-quantum correlations [0.2085467441379275]
We introduce and study an intermediate hybrid no-signaling quantum set of non-local correlations that we term $textbfHNSQ$ in the multi-party Bell scenario.
Specifically, the set $textbfHNSQ$ is a super-quantum set of correlations derived from no-signaling assemblages.
In contrast to the usual no-signaling correlations, the new set allows for simple security of (one-sided)-device-independent applications against super-quantum adversaries.
arXiv Detail & Related papers (2021-07-14T17:40:42Z) - Observation-dependent suppression and enhancement of two-photon
coincidences by tailored losses [68.8204255655161]
Hong-Ou-Mandel (HOM) effect can lead to a perfect suppression of two-particle coincidences between the output ports of a balanced beam splitter.
In this work, we demonstrate experimentally that the two-particle coincidence statistics of two bosons can instead be seamlessly tuned to substantial enhancement.
Our findings reveal a new approach to harnessing non-Hermitian settings for the manipulation of multi-particle quantum states.
arXiv Detail & Related papers (2021-05-12T06:47:35Z) - Entropy certification of a realistic QRNG based on single-particle
entanglement [0.0]
In single-particle entanglement (SPE) two degrees of freedom of a single particle are entangled.
We show how it is possible to provide a semi-device independent certification of realistic quantum random number generators based on Bell inequality violation by SPE states of photons.
arXiv Detail & Related papers (2021-04-13T10:53:10Z) - Bell nonlocality is not sufficient for the security of standard
device-independent quantum key distribution protocols [1.9573380763700712]
Device-independent quantum key distribution is a secure quantum cryptographic paradigm that allows two honest users to establish a secret key.
We show that no protocol of this form allows for establishing a secret key when implemented on any correlation obtained by measuring local projective measurements.
arXiv Detail & Related papers (2021-03-03T19:10:06Z) - Single photon randomness originating from the symmetry of dipole
emission and the unpredictability of spontaneous emission [55.41644538483948]
Quantum random number generation is a key ingredient for quantum cryptography and fundamental quantum optics.
We experimentally demonstrate quantum random number generation based on the spontaneous emission process.
The scheme can be extended to random number generation by coherent single photons with potential applications in solid-state based quantum communication at room temperature.
arXiv Detail & Related papers (2021-02-18T14:07:20Z) - Single trusted qubit is necessary and sufficient for quantum realisation
of extremal no-signaling correlations [0.2085467441379275]
We show that quantum statistics can never reproduce an extremal non-local point within the set of no-signaling boxes.
We prove a positive result showing that already a single trusted qubit is enough for quantum theory to produce a self-testable extremal point.
arXiv Detail & Related papers (2020-04-30T13:52:01Z) - Using Randomness to decide among Locality, Realism and Ergodicity [91.3755431537592]
An experiment is proposed to find out, or at least to get an indication about, which one is false.
The results of such experiment would be important not only to the foundations of Quantum Mechanics.
arXiv Detail & Related papers (2020-01-06T19:26:32Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.