We present the first security analysis of conference key agreement (CKA) in the most adversarial model of device independence (DI). Our protocol can be implemented by any experimental setup that is capable of performing Bell tests (specifically, the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality), and security can in principle be obtained for any violation of the MABK inequality that detects genuine multipartite entanglement among the N parties involved in the protocol. As our main tool, we derive a direct physical connection between the N -partite MABK inequality and the CHSH inequality, showing that certain violations of the MABK inequality correspond to a violation of the CHSH inequality between one of the parties and the other N − 1. We compare the asymptotic key rate for DICKA to the case where the parties use N − 1 DIQKD protocols in order to generate a common key. We show that for some regime of noise the DICKA protocol leads to better rates.Quantum communication allows cryptographic security that is provably impossible to obtain using any classical means. Probably the most famous example of a quantum advantage is quantum key distribution (QKD) [1,2], which allows two parties, Alice and Bob, to exchange an encryption key whose security is guaranteed even if the adversary has an arbitrarily powerful quantum computer. What's more, properties of entanglement lead to the remarkable feature that security is sometimes possible even if the quantum devices used to execute the protocol are largely untrusted. Specifically, the notion of device independent (DI) security [3-5] models quantum devices as black boxes in which we may only choose measurement settings and observe measurement outcomes. Yet, the quantum state and measurements employed by such boxes are unknown, and may even be prepared arbitrarily by the adversary.Significant efforts have been undertaken to establish the security of device independent QKD [5][6][7][8][9][10][11], leading to ever more sophisticated security proofs. Initial proofs assumed a simple model in which the devices act independently and identically (i.i.d.) in each round of the protocol. This significantly simplifies the security analysis since the underlying properties of the devices may first be estimated by gaining statistical confidence from the observation of the measurement outcomes in the tested rounds. The main challenge overcome by the more recent security proofs [8][9][10][11] was to establish security even if the devices behave arbitrarily from one round to the next, including having an arbitrary memory of the past that they might use to thwart the efforts of Alice and Bob. Assuming that the devices carry at least some memory of past interactions is an extremely realistic assumption due to technical limitations, even if Alice and Bob prepare their own trusted, but imperfect, devices, highlighting the extreme importance of such analyses for the implementation of device independent QKD. In contrast, relatively little is known about device independence outside the realm ...
Quantum key distribution allows for the generation of a secret key between distant parties connected by a quantum channel such as optical fibre or free space. Unfortunately, the rate of generation of a secret key by direct transmission is fundamentally limited by the distance. This limit can be overcome by the implementation of so-called quantum repeaters. Here, we assess the performance of a specific but very natural setup called a single sequential repeater for quantum key distribution. We offer a fine-grained assessment of the repeater by introducing a series of benchmarks. The benchmarks, which should be surpassed to claim a working repeater, are based on finite-energy considerations, thermal noise and the losses in the setup. In order to boost the performance of the studied repeaters we introduce two methods. The first one corresponds to the concept of a cut-off, which reduces the effect of decoherence during storage of a quantum state by introducing a maximum storage time. Secondly, we supplement the standard classical post-processing with an advantage distillation procedure. Using these methods, we find realistic parameters for which it is possible to achieve rates greater than each of the benchmarks, guiding the way towards implementing quantum repeaters. * These authors contributed equally; f.d.rozpedek@tudelft.nl arXiv:1705.00043v2 [quant-ph]
In the implementation of device-independent quantum key distribution we are interested in maximizing the key rate, i.e. the number of key bits that can be obtained per signal, for a fixed security parameter. In the finite size regime, we furthermore also care about the minimum number of signals required before key can be obtained at all. Here, we perform a fully finite size analysis of device independent protocols using the CHSH inequality both for collective and coherent attacks. For coherent attacks, we sharpen the results recently derived in Arnon-Friedman et al., Nat. Commun. 9, 459 (2018) [1], to reduce the minimum number of signals before key can be obtained. In the regime of collective attacks, where the devices are restricted to have no memory, we employ two different techniques that exploit this restriction to further reduce the number of signals. We then discuss experimental platforms in which DIQKD may be implemented. We analyse Bell violations and expected QBER achieved in previous Bell tests with distant setups and situate these parameters in the security analysis. Moreover, focusing on one of the experimental platforms, namely nitrogen-vacancy based systems, we describe experimental improvements that can lead to a device-independent quantum key distribution implementation in the near future. arXiv:1811.07983v2 [quant-ph]
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.