2022
DOI: 10.1088/1367-2630/ac71bc
|View full text |Cite
|
Sign up to set email alerts
|

Receiver-device-independent quantum key distribution protocols

Abstract: We consider a receiver-device-independent (RDI) approach to quantum key distribution. Specifically, we discuss protocols for a prepare-and-measure scenario and present a detailed security analysis. The sender's (Alice's) device is partially characterized, in the sense that we assume bounds on the overlaps of the prepared quantum states. The receiver's (Bob's) device requires no characterisation and can be represented as a black-box. Our protocols are therefore robust to any attack on Bob, such as blinding atta… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 50 publications
0
14
0
Order By: Relevance
“…Note that the MDI approach cannot provide security in the receiver-DI scenario, as some level of trust will always be required for both honest parties. We note that a detailed comparison of our approach with previous works is given in the companion paper [39], as well as a more detailed discussion of how to justify the overlap bounds in practice.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Note that the MDI approach cannot provide security in the receiver-DI scenario, as some level of trust will always be required for both honest parties. We note that a detailed comparison of our approach with previous works is given in the companion paper [39], as well as a more detailed discussion of how to justify the overlap bounds in practice.…”
Section: Discussionmentioning
confidence: 99%
“…Still, the requirements for transmission and efficiency are considerably relaxed compared to the full DI model (or the one-sided DI approach of Ref. [24]), with the additional advantage that no source of entanglement is required, as well as significantly reducing the required efficiency on Bob's side (in principle, the efficiency can be made arbitrarily low, as we show in the companion article [39]).…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The situation where the source and one of the parties are not trusted have been considered in [21], [22]. Other recent studies consider the situation where only the receiver-device is not trusted, called receiver-deviceindependent-QKD (RDI-QKD) [23], [24]. Moving to the RDI-QKD scenario can be advantageous for situations where Bob's devices are placed in an unmonitored environment.…”
Section: Introductionmentioning
confidence: 99%