# Fully device-independent quantum key distribution.

@article{Vazirani2014FullyDQ, title={Fully device-independent quantum key distribution.}, author={Umesh V. Vazirani and Thomas Vidick}, journal={Physical Review Letters}, year={2014}, volume={113}, pages={140501} }

Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based…

## Topics from this paper

## 254 Citations

Fully device independent quantum key distribution

- Physics, MedicineCommun. ACM
- 2019

This work rigorously proves the device-independent security of an entanglement-based protocol building on Ekert's original proposal for quantum key distribution and builds on techniques from the classical theory of pseudo-randomness to achieve a new quantitative understanding of the non-local nature of quantum correlations.

Simple and tight device-independent security proofs

- Computer Science, PhysicsSIAM J. Comput.
- 2019

A flexible protocol is provided and a security proof is given that provides quantitative bounds that are asymptotically tight, even in the presence of general quantum adversaries, which is likely that these protocols can be practically implemented in the near future.

Full Security of Quantum Key Distribution From No-Signaling Constraints

- Computer Science, PhysicsIEEE Transactions on Information Theory
- 2014

We analyze a cryptographic protocol for generating a distributed secret key from correlations that violate a Bell inequality by a sufficient amount, and prove its security against eavesdroppers,…

Practical device-independent quantum cryptography via entropy accumulation

- Computer Science, MedicineNature Communications
- 2017

A property of entropy, termed “entropy accumulation”, is presented, which asserts that the total amount of entropy of a large system is the sum of its parts, which is used to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters.

qu an tph ] 2 6 M ar 2 01 9 Simple and tight device-independent security proofs

- 2019

Device-independent security is the gold standard for quantum cryptography: not only is security based entirely on the laws of quantum mechanics, but it holds irrespective of any a priori assumptions…

Indian Statistical Institute Master ’ s Thesis Device Independent Quantum Cryptography For Finite Samples

- 2017

Quantum cryptography promises levels of security that are impossible to replicate in classical world. In all the initial quantum cryptographic protocols, the involving parties trust the measurement…

Simple proof of confidentiality for private quantum channels in noisy environments

- Computer Science, PhysicsQuantum Science and Technology
- 2019

A simple proof of confidentiality for parallel quantum channels established via entanglement distillation based on hashing, in the presence of noise, and a malicious eavesdropper who is restricted only by the laws of quantum mechanics is provided.

The Statistics and Security of Quantum Key Distribution

- Computer Science
- 2018

The Trojan Horse Attack is investigated, a form of side-channel attack that could threaten the security of existing key distribution protocols, and a framework based on Markov chains and probability generating functions is developed to show how one may easily calculate an analytic expression for the completion time of a probabilistic process.

Experimental demonstration of Gaussian protocols for one-sided device-independent quantum key distribution

- Mathematics, Physics
- 2014

All protocols that can be 1sDI and their maximum loss tolerance are identified, and a direct link between the relevant EPR steering inequality and the secret key rate is established, further strengthening the relationship between these asymmetric notions of nonlocality and device independence.

Entangled protocols and non-local games for testing quantum systems

- Computer Science
- 2017

This thesis investigates multi-prover interactive proofs for verifying quantum behavior, and focuses on the stringent testing scenario in which the verifier in the interactive proof is completely classical as described above.

## References

SHOWING 1-10 OF 38 REFERENCES

Device-independent quantum key distribution secure against collective attacks

- Physics
- 2009

Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows…

Full Security of Quantum Key Distribution From No-Signaling Constraints

- Computer Science, PhysicsIEEE Transactions on Information Theory
- 2014

We analyze a cryptographic protocol for generating a distributed secret key from correlations that violate a Bell inequality by a sufficient amount, and prove its security against eavesdroppers,…

No signaling and quantum key distribution.

- Physics, Computer SciencePhysical review letters
- 2005

A key distribution scheme provably secure against general attacks by a postquantum eavesdropper limited only by the impossibility of superluminal signaling is described, which stems from violation of a Bell inequality.

Memory attacks on device-independent quantum cryptography.

- Computer Science, PhysicsPhysical review letters
- 2013

This work identifies a critical weakness of device-independent protocols that rely on public communication between secure laboratories that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each other (and no other party).

Secure device-independent quantum key distribution with causally independent measurement devices.

- Physics, MedicineNature communications
- 2011

This work shows that device-independent QKD is possible with key rates comparable to those of standard schemes, and provides a general security proof for a large class of protocols in a model in which the raw key is generated by independent measurements.

Security of practical private randomness generation

- Physics
- 2013

Measurements on entangled quantum systems necessarily yield outcomes that are intrinsically unpredictable if they violate a Bell inequality. This property can be used to generate certified randomness…

Quantum cryptography with imperfect apparatus

- Computer Science, PhysicsProceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280)
- 1998

This paper proposes and gives a concrete design for a new concept, self-checking source, which requires the manufacturer of the photon source to provide certain tests; these tests are designed such that, if passed, the source is guaranteed to be adequate for the security of the quantum key distribution protocol, even though the testing devices may not be built to the original specification.

Quantum cryptography: Public key distribution and coin tossing

- Physics, Computer ScienceTheor. Comput. Sci.
- 2014

A protocol for coin-tossing by exchange of quantum messages is presented, which is secure against traditional kinds of cheating, even by an opponent with unlimited computing power, but ironically can be subverted by use of a still subtler quantum phenomenon, the Einstein-Podolsky-Rosen paradox.

Experimental Quantum Cryptography

- Mathematics, Computer ScienceEUROCRYPT
- 1990

Initial results from an apparatus and protocol designed to implement quantum public key distribution are described, by which two users exchange a random quantum transmission, consisting of very faint flashes of polarized light, which remains secure against an adversary with unlimited computing power.

Secrecy extraction from no-signaling correlations

- Physics
- 2006

Quantum cryptography shows that one can guarantee the secrecy of correlation on the sole basis of the laws of physics, that is, without limiting the computational power of the eavesdropper. The usual…