High-speed device-independent quantum key distribution against collective attacks

  title={High-speed device-independent quantum key distribution against collective attacks},
  author={Qiang Zhang and Wen-Zhao Liu and Yu-Zhe Zhang and Yi-Zheng Zhen and Ming-Han Li and Yang Liu and Jingyun Fan and Feihu Xu and Jian-Wei Pan},
The security of quantum key distribution (QKD) usually relies on that the users’s devices are well characterized according to the security models made in the security proofs. In contrast,device-independent QKD an entanglement-based protocol permits the security even without any knowledge of the underlying devices. Despite its beauty in theory, device-independent QKD is elusive to realize with current technology. This is because a faithful realization requires ahigh-quality violation of Bell… 
2 Citations

Figures and Tables from this paper

Receiver-Device-Independent Quantum Key Distribution Protocols
We consider a receiver-device-independent (RDI) approach to quantum key distribution. Specifically, we discuss protocols for a prepare-and-measure scenario and present a detailed security analysis.
Fundamental limitations on device-independent quantum conference key agreement
Karol Horodecki, 2 Marek Winczewski, 4 and Siddhartha Das International Centre for Theory of Quantum Technologies (ICTQT), University of Gdańsk, 80-308 Gdańsk, Poland Institute of Informatics,


Device-independent quantum key distribution with random post selection
Device-independent quantum key distribution (QKD) can permit the superior security even with unknown devices. In practice, however, the realization of device-independent QKD is technically
Measurement-device-independent quantum key distribution.
The results show that long-distance quantum cryptography over say 200 km will remain secure even with seriously flawed detectors, and the key generation rate is many orders of magnitude higher than that based on full device independent QKD.
Device-independent quantum key distribution secure against collective attacks
Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows
Experimental device-independent quantum key distribution between distant users
Device-independent quantum key distribution (DIQKD) is the art of using untrusted devices to establish secret keys over an untrusted channel. So far, the real-world implementation of DIQKD remains
Device-independent quantum key distribution with random key basis
This work significantly narrows the gap between the theory and practice of DIQKD with a simple variant of the original protocol based on the celebrated Clauser-Horne-Shimony-Holt (CHSH) Bell inequality, and shows that the proposed protocol significantly improves over the original DIZKD protocol, enabling positive keys in the high noise regime for the first time.
Noisy Preprocessing Facilitates a Photonic Realization of Device-Independent Quantum Key Distribution.
Focusing on a realistic photonic setup using a source based on spontaneous parametric down conversion, this work gives explicit bounds on the minimal required global detection efficiency.
Practical device-independent quantum cryptography via entropy accumulation
A property of entropy, termed “entropy accumulation”, is presented, which asserts that the total amount of entropy of a large system is the sum of its parts, which is used to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters.
Secure device-independent quantum key distribution with causally independent measurement devices.
This work shows that device-independent QKD is possible with key rates comparable to those of standard schemes, and provides a general security proof for a large class of protocols in a model in which the raw key is generated by independent measurements.
Device-independent quantum key distribution with asymmetric CHSH inequalities
The main technical result of this work is a tight bound on the von Neumann entropy of one of Alice's measurement outcomes conditioned on a quantum eavesdropper for the family of asymmetric CHSH expressions the authors consider and allowing for an arbitrary amount of noise preprocessing.
Device-independent quantum random-number generation
Genuine, unpredictable quantum random-number generation that is provably secure against quantum and classical adversaries is demonstrated, certified by the loophole-free violation of a Bell inequality.