# Device-independent quantum key distribution secure against collective attacks

@article{Pironio2009DeviceindependentQK, title={Device-independent quantum key distribution secure against collective attacks}, author={Stefano Pironio and Antonio Ac{\'i}n and Nicolas Brunner and Nicolas Gisin and Serge Massar and Valerio Scarani}, journal={New Journal of Physics}, year={2009}, volume={11}, pages={045021} }

Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows from the laws of quantum physics, but contrary to usual QKD, it does not rely on any assumptions about the internal working of the quantum devices used in the protocol. In this paper, we present in detail the security proof for a DIQKD protocol introduced in Acin et al (2008 Phys. Rev. Lett. 98 230501…

## 332 Citations

Fully device-independent quantum key distribution.

- Computer Science, Physics
- 2014

This work rigorously proves the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks, and achieves a linear key rate and tolerates a constant noise rate in the devices.

Device-independent quantum key distribution secure against adversaries with no long-term quantum memory

- Physics
- 2012

Device-Independent Quantum Key Distribution (DIQKD) is a formalism that supersedes traditional quantum key distribution, as its security does not rely on any detailed modelling of the internal…

Device-independent quantum key distribution with random key basis

- Physics, MedicineNature communications
- 2021

This work significantly narrows the gap between the theory and practice of DIQKD with a simple variant of the original protocol based on the celebrated Clauser-Horne-Shimony-Holt (CHSH) Bell inequality, and shows that the proposed protocol significantly improves over the original DIZKD protocol, enabling positive keys in the high noise regime for the first time.

Simple and tight device-independent security proofs

- Computer Science, PhysicsSIAM J. Comput.
- 2019

A flexible protocol is provided and a security proof is given that provides quantitative bounds that are asymptotically tight, even in the presence of general quantum adversaries, which is likely that these protocols can be practically implemented in the near future.

Device-independent quantum key distribution from computational assumptions

- Physics, Computer ScienceNew Journal of Physics
- 2021

This work shows how to replace the no-communication assumption in DIQKD by a standard computational assumption from post-quantum cryptography, and gives a protocol that produces secure keys even when the components of an adversarial device can exchange arbitrary quantum communication, assuming the device is computationally bounded.

Robust Device-Independent Quantum Key Distribution

- Computer Science
- 2020

This Letter closes the gap between the theory and practice of DIQKD with a simple variant of the original protocol based on the celebrated Clauser-Horne-Shimony-Holt (CHSH) Bell inequality, and shows that the noise tolerance of DIZKD can be significantly improved.

Finite-key analysis for measurement-device-independent quantum key distribution.

- Computer Science, PhysicsNature communications
- 2014

This work provides a rigorous security proof against general attacks in the finite-key regime by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation and demonstrates the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.

One-sided device-independent quantum key distribution for two independent parties.

- Medicine, Computer ScienceOptics express
- 2020

This work shows that QKD between two independent parties can also be realized even if the device of either Alice or Bob is untrusted, and derives conditions on the extracted secret key to be unconditionally secure against arbitary attacks in the limit of asymptotic keys.

Device-Independent quantum key distribution based on non-signaling constraints

- Computer Science2016 13th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)
- 2016

This work shows a quantum key distribution protocol from correlation that violates a Bell inequality under the condition that both the source and the measurement devices are untrusted.

High-speed device-independent quantum key distribution against collective attacks

- Physics
- 2021

The security of quantum key distribution (QKD) usually relies on that the users’s devices are well characterized according to the security models made in the security proofs. In…

## References

SHOWING 1-10 OF 165 REFERENCES

No signaling and quantum key distribution.

- Physics, Computer SciencePhysical review letters
- 2005

A key distribution scheme provably secure against general attacks by a postquantum eavesdropper limited only by the impossibility of superluminal signaling is described, which stems from violation of a Bell inequality.

A practical trojan horse for bell-inequality-based quantum cryptography

- Computer Science, PhysicsQuantum Inf. Comput.
- 2002

The old truth of cryptography still holds: you have to trust the manufacturer of your cryptographic device, even when you do violate the Bell inequality.

Efficient quantum key distribution secure against no-signalling eavesdroppers

- Physics
- 2006

By carrying out measurements on entangled states, two parties can generate a secret key which is secure not only against an eavesdropper bound by the laws of quantum mechanics, but also against a…

Secrecy extraction from no-signaling correlations

- Physics
- 2006

Quantum cryptography shows that one can guarantee the secrecy of correlation on the sole basis of the laws of physics, that is, without limiting the computational power of the eavesdropper. The usual…

Postselection technique for quantum channels with applications to quantum cryptography.

- Computer Science, MedicinePhysical review letters
- 2009

A general method for studying properties of quantum channels acting on an n-partite system, whose action is invariant under permutations of the subsystems, and a simple proof for the fact that security of a discrete-variable quantum key distribution protocol against collective attacks implies security of the protocol against the most general attacks.

Device-independent security of quantum cryptography against collective attacks.

- Physics, MedicinePhysical review letters
- 2007

The main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.

From Bell's theorem to secure quantum key distribution.

- Mathematics, MedicinePhysical review letters
- 2006

A new QKD protocol is introduced and its security against any individual attack by an adversary only limited by the no-signaling condition is proved.

Experimental demonstration of time-shift attack against practical quantum key distribution systems

- Physics, Computer Science
- 2007

This result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability $(\ensuremath{\sim}4%)$ to break the security of the system.

Security of quantum key distribution using d-level systems.

- Medicine, PhysicsPhysical review letters
- 2002

The information gained by a potential eavesdropper applying a cloning-based individual attack is derived, along with an upper bound on the error rate that ensures unconditional security against coherent attacks.

Trojan-horse attacks on quantum-key-distribution systems (6 pages)

- Physics
- 2006

General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's…