# Device-independent quantum key distribution with random key basis

@article{Schwonnek2021DeviceindependentQK, title={Device-independent quantum key distribution with random key basis}, author={Ren{\'e} Schwonnek and Koon Tong Goh and Ignatius William Primaatmaja and Ernest Y-Z Tan and Ramona Wolf and Valerio Scarani and Charles Ci Wen Lim}, journal={Nature Communications}, year={2021}, volume={12} }

Device-independent quantum key distribution (DIQKD) is the art of using untrusted devices to distribute secret keys in an insecure network. It thus represents the ultimate form of cryptography, offering not only information-theoretic security against channel attacks, but also against attacks exploiting implementation loopholes. In recent years, much progress has been made towards realising the first DIQKD experiments, but current proposals are just out of reach of today’s loophole-free Bell…

## 15 Citations

Experimental device-independent quantum key distribution between distant users

- Physics
- 2021

Device-independent quantum key distribution (DIQKD) is the art of using untrusted devices to establish secret keys over an untrusted channel. So far, the real-world implementation of DIQKD remains…

High-speed device-independent quantum key distribution against collective attacks

- Physics
- 2021

The security of quantum key distribution (QKD) usually relies on that the users’s devices are well characterized according to the security models made in the security proofs. In…

Device-independent quantum key distribution with random post selection

- Physics
- 2021

Device-independent quantum key distribution (QKD) can permit the superior security even with unknown devices. In practice, however, the realization of device-independent QKD is technically…

Device-Independent QKD

- Computer ScienceQuantum Key Distribution
- 2021

DIQKD circumvents the problem that security proofs often only apply to the ideal setting of the theoretical protocol and do not take into account the problems that arise when implementing a protocol, such as the photon-number-splitting attack.

Discrete-variable quantum key distribution with homodyne detection

- PhysicsQuantum
- 2022

Most quantum key distribution (QKD) protocols can be classified as either a discrete-variable (DV) protocol or continuous-variable (CV) protocol, based on how classical information is being encoded.…

Device-independent quantum key distribution based on Bell inequalities with more than two inputs and two outputs

- Physics
- 2021

Device-independent quantum key distribution (DI-QKD) offers the strongest form of security against eavesdroppers bounded by the laws of quantum mechanics. However, a practical implementation is still…

Semi-device-independent quantum key distribution based on a coherence equality

- Physics
- 2021

We introduce the first example of a semi-device-independent quantum key distribution (SDIQKD) protocol with a classical Alice and Bob. The protocol is based on the Coherence Equality (CE) game…

Machine learning for secure key rate in continuous-variable quantum key distribution

- Physics
- 2021

Continuous-variable quantum key distribution (CV-QKD) with discrete modulation has received widespread attentions because of its experimental simplicity, lower-cost implementation and ease to…

Intrinsic Non-Locality and Device-Independent Conference Key Agreement

- Physics
- 2021

In this work, we introduce the multipartite intrinsic non-locality as a resource quantifier for the multipartite scenario of device-independent (DI) conference key agreement. We prove that this…

Limitations on device independent key secure against non signaling adversary via the squashed non-locality

- Physics
- 2019

Marek Winczewski, Tamoghna Das, Karol Horodecki Institute of Theoretical Physics and Astrophysics, National Quantum Information Centre, Faculty of Mathematics, Physics and Informatics, University of…

## References

SHOWING 1-10 OF 69 REFERENCES

Device-independent quantum key distribution secure against collective attacks

- Physics
- 2009

Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows…

Advantage Distillation for Device-Independent Quantum Key Distribution.

- Physics, MedicinePhysical review letters
- 2020

This work derives an efficiently verifiable condition to certify that advantage distillation is secure against collective attacks in a variety of DIQKD scenarios, and uses this to show that it can indeed allow higher noise tolerances, which could help to pave the way towards an experimental implementation of DIZKD.

Computing secure key rates for quantum key distribution with untrusted devices

- Mathematics, Computer Science
- 2019

This Letter presents a numerical framework based on semi-definite programming that gives reliable lower bounds on the asymptotic secret key rate of any QKD protocol using untrusted devices.

Device-independent quantum random-number generation

- Medicine, Computer ScienceNature
- 2018

Genuine, unpredictable quantum random-number generation that is provably secure against quantum and classical adversaries is demonstrated, certified by the loophole-free violation of a Bell inequality.

Simple and tight device-independent security proofs

- Computer Science, PhysicsSIAM J. Comput.
- 2019

A flexible protocol is provided and a security proof is given that provides quantitative bounds that are asymptotically tight, even in the presence of general quantum adversaries, which is likely that these protocols can be practically implemented in the near future.

Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum Devices

- Mathematics, Computer ScienceJ. ACM
- 2016

The method achieves, for the first time, exponential expansion combined with cryptographic security and noise tolerance, and has the following new features: cryptographic level of security, tolerating a constant level of imprecision in devices, and requiring only unit size quantum memory in devices.

Robust device independent quantum key distribution

- Mathematics, Computer ScienceITCS
- 2014

The proof of security builds upon a number of techniques, including randomness extractors that are secure against quantum storage as well as ideas originating in the coding strategy used in the proof of the Holevo-Schumacher-Westmoreland theorem which apply to bound correlations across multiple rounds in a way not unrelated to information-theoretic proofs of the parallel repetition property for multiplayer games.

Towards a realization of device-independent quantum key distribution

- Physics, Computer ScienceQuantum Science and Technology
- 2019

A fully finite size analysis of device independent protocols using the CHSH inequality both for collective and coherent attacks and describes experimental improvements that can lead to a device-independent quantum key distribution implementation in the near future.

Device-Independent Quantum Key Distribution with Local Bell Test

- Mathematics, Physics
- 2012

Device-independent quantum key distribution (DIQKD) in its current design requires a violation of a Bell’s inequality between two parties, Alice and Bob, who are connected by a quantum channel.…

Fully device independent quantum key distribution

- Physics, MedicineCommun. ACM
- 2019

This work rigorously proves the device-independent security of an entanglement-based protocol building on Ekert's original proposal for quantum key distribution and builds on techniques from the classical theory of pseudo-randomness to achieve a new quantitative understanding of the non-local nature of quantum correlations.