Device-independent quantum key distribution with random key basis

  title={Device-independent quantum key distribution with random key basis},
  author={Ren{\'e} Schwonnek and Koon Tong Goh and Ignatius William Primaatmaja and Ernest Y-Z Tan and Ramona Wolf and Valerio Scarani and Charles Ci Wen Lim},
  journal={Nature Communications},
Device-independent quantum key distribution (DIQKD) is the art of using untrusted devices to distribute secret keys in an insecure network. It thus represents the ultimate form of cryptography, offering not only information-theoretic security against channel attacks, but also against attacks exploiting implementation loopholes. In recent years, much progress has been made towards realising the first DIQKD experiments, but current proposals are just out of reach of today’s loophole-free Bell… 

Figures from this paper

Experimental device-independent quantum key distribution between distant users
Device-independent quantum key distribution (DIQKD) is the art of using untrusted devices to establish secret keys over an untrusted channel. So far, the real-world implementation of DIQKD remains
High-speed device-independent quantum key distribution against collective attacks
The security of quantum key distribution (QKD) usually relies on that the users’s devices are well characterized according to the security models made in the security proofs. In
Device-independent quantum key distribution with random post selection
Device-independent quantum key distribution (QKD) can permit the superior security even with unknown devices. In practice, however, the realization of device-independent QKD is technically
Device-Independent QKD
  • Ramona Wolf
  • Computer Science
    Quantum Key Distribution
  • 2021
DIQKD circumvents the problem that security proofs often only apply to the ideal setting of the theoretical protocol and do not take into account the problems that arise when implementing a protocol, such as the photon-number-splitting attack.
Discrete-variable quantum key distribution with homodyne detection
Most quantum key distribution (QKD) protocols can be classified as either a discrete-variable (DV) protocol or continuous-variable (CV) protocol, based on how classical information is being encoded.
Device-independent quantum key distribution based on Bell inequalities with more than two inputs and two outputs
Device-independent quantum key distribution (DI-QKD) offers the strongest form of security against eavesdroppers bounded by the laws of quantum mechanics. However, a practical implementation is still
Semi-device-independent quantum key distribution based on a coherence equality
We introduce the first example of a semi-device-independent quantum key distribution (SDIQKD) protocol with a classical Alice and Bob. The protocol is based on the Coherence Equality (CE) game
Machine learning for secure key rate in continuous-variable quantum key distribution
Continuous-variable quantum key distribution (CV-QKD) with discrete modulation has received widespread attentions because of its experimental simplicity, lower-cost implementation and ease to
Intrinsic Non-Locality and Device-Independent Conference Key Agreement
In this work, we introduce the multipartite intrinsic non-locality as a resource quantifier for the multipartite scenario of device-independent (DI) conference key agreement. We prove that this
Limitations on device independent key secure against non signaling adversary via the squashed non-locality
Marek Winczewski, Tamoghna Das, Karol Horodecki Institute of Theoretical Physics and Astrophysics, National Quantum Information Centre, Faculty of Mathematics, Physics and Informatics, University of


Device-independent quantum key distribution secure against collective attacks
Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows
Advantage Distillation for Device-Independent Quantum Key Distribution.
This work derives an efficiently verifiable condition to certify that advantage distillation is secure against collective attacks in a variety of DIQKD scenarios, and uses this to show that it can indeed allow higher noise tolerances, which could help to pave the way towards an experimental implementation of DIZKD.
Computing secure key rates for quantum key distribution with untrusted devices
This Letter presents a numerical framework based on semi-definite programming that gives reliable lower bounds on the asymptotic secret key rate of any QKD protocol using untrusted devices.
Device-independent quantum random-number generation
Genuine, unpredictable quantum random-number generation that is provably secure against quantum and classical adversaries is demonstrated, certified by the loophole-free violation of a Bell inequality.
Simple and tight device-independent security proofs
A flexible protocol is provided and a security proof is given that provides quantitative bounds that are asymptotically tight, even in the presence of general quantum adversaries, which is likely that these protocols can be practically implemented in the near future.
Robust Protocols for Securely Expanding Randomness and Distributing Keys Using Untrusted Quantum Devices
The method achieves, for the first time, exponential expansion combined with cryptographic security and noise tolerance, and has the following new features: cryptographic level of security, tolerating a constant level of imprecision in devices, and requiring only unit size quantum memory in devices.
Robust device independent quantum key distribution
The proof of security builds upon a number of techniques, including randomness extractors that are secure against quantum storage as well as ideas originating in the coding strategy used in the proof of the Holevo-Schumacher-Westmoreland theorem which apply to bound correlations across multiple rounds in a way not unrelated to information-theoretic proofs of the parallel repetition property for multiplayer games.
Towards a realization of device-independent quantum key distribution
A fully finite size analysis of device independent protocols using the CHSH inequality both for collective and coherent attacks and describes experimental improvements that can lead to a device-independent quantum key distribution implementation in the near future.
Device-Independent Quantum Key Distribution with Local Bell Test
Device-independent quantum key distribution (DIQKD) in its current design requires a violation of a Bell’s inequality between two parties, Alice and Bob, who are connected by a quantum channel.
Fully device independent quantum key distribution
This work rigorously proves the device-independent security of an entanglement-based protocol building on Ekert's original proposal for quantum key distribution and builds on techniques from the classical theory of pseudo-randomness to achieve a new quantitative understanding of the non-local nature of quantum correlations.