Photonic verification of device-independent quantum key distribution against collective attacks
@inproceedings{Liu2021PhotonicVO, title={Photonic verification of device-independent quantum key distribution against collective attacks}, author={Wen-Zhao Liu and Yu-Zhe Zhang and Yi-Zheng Zhen and Ming-Han Li and Yang Liu and Jingyun Fan and Feihu Xu and Qiang Zhang and Jianwei Pan}, year={2021} }
The security of quantum key distribution (QKD) usually relies on that the users’s devices are well characterized according to the security models made in the security proofs. In contrast, device-independent QKD — an entanglement-based protocol — permits the security even without any knowledge of the underlying quantum devices. Despite its beauty in theory, device-independent QKD is elusive to realize with current technologies. Especially in photonic implementations, the requirements for…
Figures and Tables from this paper
4 Citations
A device-independent quantum key distribution system for distant users
- Computer ScienceNature
- 2022
The results of secure key exchange with potentially untrusted devices pave the way to the ultimate form of quantum secure communications in future quantum networks.
Quantum Advantage in Cryptography
- Computer Science, MathematicsArXiv
- 2022
An overview of the principles and state of the art of quantum cryptography, as well as an assessment of current challenges and prospects for overcoming them are provided.
Graph-theoretic approach to Bell experiments with low detection efficiency
- Physics
- 2022
Bell inequality tests where the detection efficiency is below a certain threshold η crit can be simulated with local hidden-variable models. For the Clauser-Horne-Shimony-Holt Bell inequality and…
Multipartite Intrinsic Non-Locality and Device-Independent Conference Key Agreement
- Computer Science, MathematicsQuantum
- 2023
It is proved that multipartite intrinsic non-locality is additive, convex, and monotone under a class of free operations called local operations and common randomness and is an upper bound on secret key rate in the general multipartites scenario of device-independent conference key agreement.
References
SHOWING 1-10 OF 62 REFERENCES
Device-Independent Quantum Key Distribution with Random Postselection.
- Computer SciencePhysical review letters
- 2022
This work proposes the device-independent QKD protocol with random postselection, where the secret keys are extracted only from the postselected subset of outcomes, which can tolerate detector efficiency as low as 68.5%, which goes beyond standard security proofs.
Experimental device-independent quantum key distribution between distant users
- Computer Science
- 2021
This paper demonstrates for the first time the distribution of a secure key, based on asymptotic security estimates, in a fully device-independent way between two users separated by 400 metres and analyses the experiment’s capability to distribute a secret key with finite-size security against collective attacks.
Quantum Complementarity Approach to Device-Independent Security
- Physics
- 2021
Xingjian Zhang, Pei Zeng, Tian Ye, Hoi-Kwong Lo 3, , and Xiongfeng Ma Center for Quantum Information, Institute for Interdisciplinary Information Sciences, Tsinghua University, Beijing 100084, China…
Phys
- Rev. Lett. 23, 880
- 1969
New Journal of Physics 11
- 045021
- 2009
and O
- Fawzi, Device-independent lower bounds on the conditional von neumann entropy
- 2021
Nature Physics 17
- 448
- 2021
Phys
- Rev. Lett. 124, 230502
- 2020
npj Quantum Information 5
- 14
- 2019
Phys
- Rev. Lett. 98, 010401
- 2007