High-speed device-independent quantum key distribution against collective attacks

@inproceedings{Zhang2021HighspeedDQ,
  title={High-speed device-independent quantum key distribution against collective attacks},
  author={Qiang Zhang and Wen-Zhao Liu and Yu-Zhe Zhang and Yi-Zheng Zhen and Ming-Han Li and Yang Liu and Jingyun Fan and Feihu Xu and Jian-Wei Pan},
  year={2021}
}
  • Qiang Zhang, Wen-Zhao Liu, +6 authors Jian-Wei Pan
  • Published 4 October 2021
  • Physics
The security of quantum key distribution (QKD) usually relies on that the users’s devices are well characterized according to the security models made in the security proofs. In contrast,device-independent QKD an entanglement-based protocol permits the security even without any knowledge of the underlying devices. Despite its beauty in theory, device-independent QKD is elusive to realize with current technology. This is because a faithful realization requires ahigh-quality violation of Bell… Expand
2 Citations

Figures and Tables from this paper

Receiver-Device-Independent Quantum Key Distribution Protocols
We consider a receiver-device-independent (RDI) approach to quantum key distribution. Specifically, we discuss protocols for a prepare-and-measure scenario and present a detailed security analysis.Expand
Fundamental limitations on device-independent quantum conference key agreement
Karol Horodecki, 2 Marek Winczewski, 4 and Siddhartha Das International Centre for Theory of Quantum Technologies (ICTQT), University of Gdańsk, 80-308 Gdańsk, Poland Institute of Informatics,Expand

References

SHOWING 1-10 OF 103 REFERENCES
Device-independent quantum key distribution with random post selection
  • Feihu Xu, Yu-Zhe Zhang, Qiang Zhang, Jian-Wei Pan
  • Physics
  • 2021
Device-independent quantum key distribution (QKD) can permit the superior security even with unknown devices. In practice, however, the realization of device-independent QKD is technicallyExpand
Measurement-device-independent quantum key distribution.
TLDR
The results show that long-distance quantum cryptography over say 200 km will remain secure even with seriously flawed detectors, and the key generation rate is many orders of magnitude higher than that based on full device independent QKD. Expand
Device-independent quantum key distribution secure against collective attacks
Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD followsExpand
Experimental device-independent quantum key distribution between distant users
Device-independent quantum key distribution (DIQKD) is the art of using untrusted devices to establish secret keys over an untrusted channel. So far, the real-world implementation of DIQKD remainsExpand
Device-independent quantum key distribution with random key basis
TLDR
This work significantly narrows the gap between the theory and practice of DIQKD with a simple variant of the original protocol based on the celebrated Clauser-Horne-Shimony-Holt (CHSH) Bell inequality, and shows that the proposed protocol significantly improves over the original DIZKD protocol, enabling positive keys in the high noise regime for the first time. Expand
Noisy Preprocessing Facilitates a Photonic Realization of Device-Independent Quantum Key Distribution.
TLDR
Focusing on a realistic photonic setup using a source based on spontaneous parametric down conversion, this work gives explicit bounds on the minimal required global detection efficiency. Expand
Practical device-independent quantum cryptography via entropy accumulation
TLDR
A property of entropy, termed “entropy accumulation”, is presented, which asserts that the total amount of entropy of a large system is the sum of its parts, which is used to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters. Expand
Secure device-independent quantum key distribution with causally independent measurement devices.
TLDR
This work shows that device-independent QKD is possible with key rates comparable to those of standard schemes, and provides a general security proof for a large class of protocols in a model in which the raw key is generated by independent measurements. Expand
Device-independent quantum key distribution with asymmetric CHSH inequalities
TLDR
The main technical result of this work is a tight bound on the von Neumann entropy of one of Alice's measurement outcomes conditioned on a quantum eavesdropper for the family of asymmetric CHSH expressions the authors consider and allowing for an arbitrary amount of noise preprocessing. Expand
Device-independent quantum random-number generation
TLDR
Genuine, unpredictable quantum random-number generation that is provably secure against quantum and classical adversaries is demonstrated, certified by the loophole-free violation of a Bell inequality. Expand
...
1
2
3
4
5
...