# Noisy Preprocessing Facilitates a Photonic Realization of Device-Independent Quantum Key Distribution.

@article{Ho2020NoisyPF, title={Noisy Preprocessing Facilitates a Photonic Realization of Device-Independent Quantum Key Distribution.}, author={Melvyn Ho and Pavel Sekatski and Ernest Y-Z Tan and Renato Renner and Jean-Daniel Bancal and Nicolas Sangouard}, journal={Physical review letters}, year={2020}, volume={124 23}, pages={ 230502 } }

Device-independent quantum key distribution provides security even when the equipment used to communicate over the quantum channel is largely uncharacterized. An experimental demonstration of device-independent quantum key distribution is however challenging. A central obstacle in photonic implementations is that the global detection efficiency, i.e., the probability that the signals sent over the quantum channel are successfully received, must be above a certain threshold. We here propose a… Expand

#### 8 Citations

Device-independent quantum key distribution based on asymmetric CHSH inequalities

- Computer Science, Physics
- 2020

The simplest device-independent quantum key distribution protocol is based on the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality and allows two users, Alice and Bob, to generate a secret key if… Expand

Device-independent lower bounds on the conditional von Neumann entropy

- Physics
- 2021

The rates of several device-independent (DI) protocols, including quantum key-distribution (QKD) and randomness expansion (RE), can be computed via an optimization of the conditional von Neumann… Expand

Device-independent quantum key distribution from generalized CHSH inequalities

- Computer Science, Physics
- Quantum
- 2021

It is shown that this additional information, which is anyway available in practice, allows one to get higher key rates than with the CHSH score, and the potential advantage of this technique for realistic photonic implementations of device-independent quantum key distribution is discussed. Expand

Computing conditional entropies for quantum correlations

- Medicine, Physics
- Nature communications
- 2021

This work finds new upper bounds on the minimal global detection efficiency required to perform device-independent quantum key distribution without additional preprocessing and shows that its construction can be readily combined with the entropy accumulation theorem in order to establish full finite-key security proofs for these protocols. Expand

Effect of source statistics on utilizing photon entanglement in quantum key distribution

- Physics
- 2021

The effect of photon-pair generation rate on quantum entanglement is analyzed. Two techniques of producing polarization entanglement were compared: a cw-pumped spontaneous parametric down-conversion… Expand

Fidelity Bounds for Device-Independent Advantage Distillation

- Physics
- 2021

It is known that advantage distillation (that is, information reconciliation using two-way communication) improves noise tolerances for quantum key distribution (QKD) setups. Two-way communication is… Expand

Improved DIQKD protocols with finite-size analysis.

- Physics, Computer Science
- 2020

A method to compute tight lower bounds on the asymptotic keyrate for any such DIQKD protocol with binary inputs and outputs and a modification to random-key-measurement protocols, using a pre-shared seed followed by a "seed recovery" step, which yields substantially higher net key generation rates. Expand

#### References

SHOWING 1-10 OF 73 REFERENCES

Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution.

- Computer Science, Medicine
- Physical review letters
- 2014

This work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server. Expand

Measurement-device-independent quantum key distribution.

- Physics, Medicine
- Physical review letters
- 2012

The results show that long-distance quantum cryptography over say 200 km will remain secure even with seriously flawed detectors, and the key generation rate is many orders of magnitude higher than that based on full device independent QKD. Expand

Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits

- Physics
- 2013

We perform a proof-of-principle demonstration of the measurement-device-independent quantum key distribution (MDI-QKD) protocol using weak coherent states and polarization-encoded qubits over two… Expand

Experimental measurement-device-independent quantum key distribution.

- Computer Science, Physics
- Physical review letters
- 2013

Up-conversion single-photon detectors with high efficiency and low noise are developed to faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection and employed to defend attacks on a nonideal source. Expand

The security of practical quantum key distribution

- Physics
- 2009

Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between… Expand

Fully device-independent quantum key distribution.

- Computer Science, Physics
- 2014

This work rigorously proves the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks, and achieves a linear key rate and tolerates a constant noise rate in the devices. Expand

Side-channel-free quantum key distribution.

- Medicine, Computer Science
- Physical review letters
- 2012

All real channels are replaced with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter to eliminate side-channel attacks. Expand

Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks.

- Computer Science, Physics
- Physical review letters
- 2013

The first proof-of-principle implementation of a new quantum-key-distribution protocol that is immune to any such attack is reported, and the feasibility of controlled two-photon interference in a real-world environment is established. Expand

Improved data post-processing in quantum key distribution and application to loss thresholds in device independent QKD

- Computer Science, Physics
- Quantum Inf. Comput.
- 2012

A generic method is shown to improve resulting secure key rates by partially reversing the simplifying post-processing for error correction purposes to improve security analysis of deviceindependent and detection-device-independent QKD schemes. Expand

Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors

- Physics
- 2011

The security of quantum key distribution (QKD) can easily be obscured if the eavesdropper can utilize technical imperfections in the actual implementation. Here, we describe and experimentally… Expand