Noisy Preprocessing Facilitates a Photonic Realization of Device-Independent Quantum Key Distribution.

Device-independent quantum key distribution provides security even when the equipment used to communicate over the quantum channel is largely uncharacterized. An experimental demonstration of device-independent quantum key distribution is however challenging. A central obstacle in photonic implementations is that the global detection efficiency, i.e., the probability that the signals sent over the quantum channel are successfully received, must be above a certain threshold. We here propose a method to significantly relax this threshold, while maintaining provable device-independent security. This is achieved with a protocol that adds artificial noise, which cannot be known or controlled by an adversary, to the initial measurement data (the raw key). Focusing on a realistic photonic setup using a source based on spontaneous parametric down conversion, we give explicit bounds on the minimal required global detection efficiency.

[1]  M. Fejer,et al.  Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.

[2]  Christine Chen,et al.  Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.

[3]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[4]  Jędrzej Kaniewski,et al.  Analytic and Nearly Optimal Self-Testing Bounds for the Clauser-Horne-Shimony-Holt and Mermin Inequalities. , 2016, Physical review letters.

[5]  V. Scarani,et al.  Device-independent quantum key distribution secure against collective attacks , 2009, 0903.4460.

[6]  R. Renner,et al.  An information-theoretic security proof for QKD protocols , 2005, quant-ph/0502064.

[7]  Yang Liu,et al.  Device-independent quantum random-number generation , 2018, Nature.

[8]  Thomas Vidick,et al.  Practical device-independent quantum cryptography via entropy accumulation , 2018, Nature Communications.

[9]  Umesh Vazirani,et al.  Fully device-independent quantum key distribution. , 2012, 1210.1810.

[10]  A. Zeilinger,et al.  Significant-Loophole-Free Test of Bell's Theorem with Entangled Photons. , 2015, Physical review letters.

[11]  I Lucio-Martinez,et al.  Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.

[12]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[13]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[14]  A. Winter,et al.  Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[15]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[16]  R. Stephenson A and V , 1962, The British journal of ophthalmology.

[17]  M. Horodecki,et al.  Violating Bell inequality by mixed spin- {1}/{2} states: necessary and sufficient condition , 1995 .

[18]  A. Shimony,et al.  Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .

[19]  A. Zeilinger,et al.  Bell violation using entangled photons without the fair-sampling assumption , 2012, Nature.

[20]  N. Gisin,et al.  Challenging preconceptions about Bell tests with photon pairs , 2014, 1405.1939.

[21]  Pavel Sekatski,et al.  What is the minimum CHSH score certifying that a state resembles the singlet? , 2020, Quantum.

[22]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[23]  E. Knill,et al.  Theory of quantum computation , 2000, quant-ph/0010057.

[24]  M. Curty,et al.  Secure quantum key distribution , 2014, Nature Photonics.

[25]  Le Phuc Thinh,et al.  Randomness Extraction from Bell Violation with Continuous Parametric Down-Conversion. , 2018, Physical review letters.

[26]  Xiongfeng Ma,et al.  Improved data post-processing in quantum key distribution and application to loss thresholds in device independent QKD , 2011, Quantum Inf. Comput..

[27]  B Kraus,et al.  Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. , 2004, Physical review letters.

[28]  T. F. D. Silva,et al.  Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits , 2012, 1207.6345.

[29]  Aaron J. Miller,et al.  Detection-loophole-free test of quantum nonlocality, and applications. , 2013, Physical review letters.

[30]  R. Penty,et al.  Quantum key distribution without detector vulnerabilities using optically seeded lasers , 2015, Nature Photonics.

[32]  Li Qian,et al.  Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.

[33]  Graeme Smith,et al.  Noisy processing and distillation of private quantum States. , 2007, Physical review letters.

[34]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[35]  R. Renner,et al.  Information-theoretic security proof for quantum-key-distribution protocols , 2005, quant-ph/0502064.

[36]  Stefano Pirandola,et al.  Side-channel-free quantum key distribution. , 2011, Physical review letters.

[37]  H. Weinfurter,et al.  Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors , 2011, 1101.5289.

[38]  E. Knill,et al.  A strong loophole-free test of local realism , 2015, 2016 Conference on Lasers and Electro-Optics (CLEO).

[39]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[40]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.