Noisy Preprocessing Facilitates a Photonic Realization of Device-Independent Quantum Key Distribution.

  title={Noisy Preprocessing Facilitates a Photonic Realization of Device-Independent Quantum Key Distribution.},
  author={Melvyn Ho and Pavel Sekatski and Ernest Y-Z Tan and Renato Renner and Jean-Daniel Bancal and Nicolas Sangouard},
  journal={Physical review letters},
  volume={124 23},
Device-independent quantum key distribution provides security even when the equipment used to communicate over the quantum channel is largely uncharacterized. An experimental demonstration of device-independent quantum key distribution is however challenging. A central obstacle in photonic implementations is that the global detection efficiency, i.e., the probability that the signals sent over the quantum channel are successfully received, must be above a certain threshold. We here propose a… Expand

Figures from this paper

Device-independent quantum key distribution based on asymmetric CHSH inequalities
The simplest device-independent quantum key distribution protocol is based on the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality and allows two users, Alice and Bob, to generate a secret key ifExpand
Device-independent lower bounds on the conditional von Neumann entropy
The rates of several device-independent (DI) protocols, including quantum key-distribution (QKD) and randomness expansion (RE), can be computed via an optimization of the conditional von NeumannExpand
Device-independent quantum key distribution from generalized CHSH inequalities
It is shown that this additional information, which is anyway available in practice, allows one to get higher key rates than with the CHSH score, and the potential advantage of this technique for realistic photonic implementations of device-independent quantum key distribution is discussed. Expand
Computing conditional entropies for quantum correlations
This work finds new upper bounds on the minimal global detection efficiency required to perform device-independent quantum key distribution without additional preprocessing and shows that its construction can be readily combined with the entropy accumulation theorem in order to establish full finite-key security proofs for these protocols. Expand
Effect of source statistics on utilizing photon entanglement in quantum key distribution
The effect of photon-pair generation rate on quantum entanglement is analyzed. Two techniques of producing polarization entanglement were compared: a cw-pumped spontaneous parametric down-conversionExpand
Fidelity Bounds for Device-Independent Advantage Distillation
It is known that advantage distillation (that is, information reconciliation using two-way communication) improves noise tolerances for quantum key distribution (QKD) setups. Two-way communication isExpand
Improved DIQKD protocols with finite-size analysis.
A method to compute tight lower bounds on the asymptotic keyrate for any such DIQKD protocol with binary inputs and outputs and a modification to random-key-measurement protocols, using a pre-shared seed followed by a "seed recovery" step, which yields substantially higher net key generation rates. Expand


Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution.
This work paves the way for the realization of a MDI-QKD network, in which the users only need compact and low-cost state-preparation devices and can share complicated and expensive detectors provided by an untrusted network server. Expand
Measurement-device-independent quantum key distribution.
The results show that long-distance quantum cryptography over say 200 km will remain secure even with seriously flawed detectors, and the key generation rate is many orders of magnitude higher than that based on full device independent QKD. Expand
Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits
We perform a proof-of-principle demonstration of the measurement-device-independent quantum key distribution (MDI-QKD) protocol using weak coherent states and polarization-encoded qubits over twoExpand
Experimental measurement-device-independent quantum key distribution.
Up-conversion single-photon detectors with high efficiency and low noise are developed to faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection and employed to defend attacks on a nonideal source. Expand
The security of practical quantum key distribution
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key betweenExpand
Fully device-independent quantum key distribution.
This work rigorously proves the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks, and achieves a linear key rate and tolerates a constant noise rate in the devices. Expand
Side-channel-free quantum key distribution.
All real channels are replaced with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter to eliminate side-channel attacks. Expand
Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks.
The first proof-of-principle implementation of a new quantum-key-distribution protocol that is immune to any such attack is reported, and the feasibility of controlled two-photon interference in a real-world environment is established. Expand
Improved data post-processing in quantum key distribution and application to loss thresholds in device independent QKD
A generic method is shown to improve resulting secure key rates by partially reversing the simplifying post-processing for error correction purposes to improve security analysis of deviceindependent and detection-device-independent QKD schemes. Expand
Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors
The security of quantum key distribution (QKD) can easily be obscured if the eavesdropper can utilize technical imperfections in the actual implementation. Here, we describe and experimentallyExpand