Photonic verification of device-independent quantum key distribution against collective attacks

  title={Photonic verification of device-independent quantum key distribution against collective attacks},
  author={Wen-Zhao Liu and Yu-Zhe Zhang and Yi-Zheng Zhen and Ming-Han Li and Yang Liu and Jingyun Fan and Feihu Xu and Qiang Zhang and Jianwei Pan},
The security of quantum key distribution (QKD) usually relies on that the users’s devices are well characterized according to the security models made in the security proofs. In contrast, device-independent QKD — an entanglement-based protocol — permits the security even without any knowledge of the underlying quantum devices. Despite its beauty in theory, device-independent QKD is elusive to realize with current technologies. Especially in photonic implementations, the requirements for… 

Figures and Tables from this paper

A device-independent quantum key distribution system for distant users

The results of secure key exchange with potentially untrusted devices pave the way to the ultimate form of quantum secure communications in future quantum networks.

Quantum Advantage in Cryptography

An overview of the principles and state of the art of quantum cryptography, as well as an assessment of current challenges and prospects for overcoming them are provided.

Graph-theoretic approach to Bell experiments with low detection efficiency

Bell inequality tests where the detection efficiency is below a certain threshold η crit can be simulated with local hidden-variable models. For the Clauser-Horne-Shimony-Holt Bell inequality and

Multipartite Intrinsic Non-Locality and Device-Independent Conference Key Agreement

It is proved that multipartite intrinsic non-locality is additive, convex, and monotone under a class of free operations called local operations and common randomness and is an upper bound on secret key rate in the general multipartites scenario of device-independent conference key agreement.



Device-Independent Quantum Key Distribution with Random Postselection.

This work proposes the device-independent QKD protocol with random postselection, where the secret keys are extracted only from the postselected subset of outcomes, which can tolerate detector efficiency as low as 68.5%, which goes beyond standard security proofs.

Experimental device-independent quantum key distribution between distant users

This paper demonstrates for the first time the distribution of a secure key, based on asymptotic security estimates, in a fully device-independent way between two users separated by 400 metres and analyses the experiment’s capability to distribute a secret key with finite-size security against collective attacks.

Quantum Complementarity Approach to Device-Independent Security

Xingjian Zhang, Pei Zeng, Tian Ye, Hoi-Kwong Lo 3, , and Xiongfeng Ma Center for Quantum Information, Institute for Interdisciplinary Information Sciences, Tsinghua University, Beijing 100084, China


  • Rev. Lett. 23, 880
  • 1969

New Journal of Physics 11

  • 045021
  • 2009

and O

  • Fawzi, Device-independent lower bounds on the conditional von neumann entropy
  • 2021

Nature Physics 17

  • 448
  • 2021


  • Rev. Lett. 124, 230502
  • 2020

npj Quantum Information 5

  • 14
  • 2019


  • Rev. Lett. 98, 010401
  • 2007