Device-independent quantum key distribution secure against collective attacks

Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows from the laws of quantum physics, but contrary to usual QKD, it does not rely on any assumptions about the internal working of the quantum devices used in the protocol. In this paper, we present in detail the security proof for a DIQKD protocol introduced in Acin et al (2008 Phys. Rev. Lett. 98 230501). This proof exploits the full structure of quantum theory (as opposed to other proofs that exploit only the no-signaling principle), but only holds against collective attacks, where the eavesdropper is assumed to act on the quantum systems of the honest parties independently and identically in each round of the protocol (although she can act coherently on her systems at any time). The security of any DIQKD protocol necessarily relies on the violation of a Bell inequality. We discuss the issue of loopholes in Bell experiments in this context.

[1]  A. Shimony,et al.  Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .

[2]  P. Pearle Hidden-Variable Example Based upon Data Rejection , 1970 .

[3]  G. Roger,et al.  Experimental Test of Bell's Inequalities Using Time- Varying Analyzers , 1982 .

[4]  J. Bell,et al.  Speakable and Unspeakable in Quatum Mechanics , 1988 .

[5]  A. Zeilinger,et al.  Speakable and Unspeakable in Quantum Mechanics , 1989 .

[6]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[7]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[8]  M. Horodecki,et al.  Violating Bell inequality by mixed spin- {1}/{2} states: necessary and sufficient condition , 1995 .

[9]  N. Gisin,et al.  Violation of Bell Inequalities by Photons More Than 10 km Apart , 1998, quant-ph/9806043.

[10]  H. Weinfurter,et al.  Violation of Bell's Inequality under Strict Einstein Locality Conditions , 1998, quant-ph/9810080.

[11]  Luis L. Sánchez-Soto,et al.  COMPLETE CHARACTERIZATION OF ARBITRARY QUANTUM MEASUREMENT PROCESSES , 1999 .

[12]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[13]  Jaromir Fiurasek Maximum-likelihood estimation of quantum measurement , 2001 .

[14]  C. Monroe,et al.  Experimental violation of a Bell's inequality with efficient detection , 2001, Nature.

[15]  Jan-Åke Larsson A practical trojan horse for bell-inequality-based quantum cryptography , 2001, Quantum Inf. Comput..

[16]  Anders Karlsson,et al.  Security of quantum key distribution using d-level systems. , 2001, Physical review letters.

[17]  D. Bruß,et al.  Optimal eavesdropping in cryptography with three-dimensional quantum states. , 2001, Physical review letters.

[18]  Frank Verstraete,et al.  Entanglement versus bell violations and their behavior under local filtering operations. , 2002, Physical review letters.

[19]  Stefano Pironio,et al.  Bell inequalities resistant to detector inefficiency , 2002 .

[20]  Richard Gill,et al.  Bell's inequality and the coincidence-time loophole , 2003, quant-ph/0312035.

[21]  Giacomo Mauro D'Ariano,et al.  Quantum calibration of measurement instrumentation. , 2004, Physical review letters.

[22]  Andrew Chi-Chih Yao,et al.  Self testing quantum apparatus , 2004, Quantum Inf. Comput..

[23]  S. Massar,et al.  Nonlocal correlations as an information-theoretic resource , 2004, quant-ph/0404097.

[24]  S. Massar,et al.  Error filtration and entanglement purification for quantum communication (17 pages) , 2004, quant-ph/0407021.

[25]  Stefano Pironio,et al.  Nonlocal correlations as an information-theoretic resource (11 pages) , 2005 .

[26]  A. Winter,et al.  Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[27]  Adrian Kent,et al.  No signaling and quantum key distribution. , 2004, Physical review letters.

[28]  N. Gisin,et al.  Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.

[29]  Vlatko Vedral,et al.  Crucial role of quantum entanglement in bulk properties of solids (4 pages) , 2004, quant-ph/0410138.

[30]  N. Gisin,et al.  General properties of nonsignaling theories , 2005, quant-ph/0508016.

[31]  N. Gisin,et al.  From Bell's theorem to secure quantum key distribution. , 2005, Physical review letters.

[32]  L. Masanes Asymptotic violation of Bell inequalities and distillability. , 2005, Physical review letters.

[33]  Stefano Pironio,et al.  Maximally Non-Local and Monogamous Quantum Correlations , 2006, Physical review letters.

[34]  S. Massar,et al.  Efficient quantum key distribution secure against no-signalling eavesdroppers , 2006, quant-ph/0605246.

[35]  V. Scarani,et al.  Secrecy extraction from no-signaling correlations , 2006, quant-ph/0606197.

[36]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[37]  V. Scarani,et al.  Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.

[38]  R. Renner Symmetry of large physical systems implies independence of subsystems , 2007 .

[39]  Christine Chen,et al.  Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.

[40]  Jonathan Barrett,et al.  The de Finetti theorem for test spaces , 2007, 0712.2265.

[41]  A. Acín,et al.  A convergent hierarchy of semidefinite programs characterizing the set of quantum correlations , 2008, 0803.4290.

[42]  V. Scarani,et al.  Testing the dimension of Hilbert spaces. , 2008, Physical review letters.

[43]  H. J. Kimble,et al.  The quantum internet , 2008, Nature.

[44]  N. Gisin,et al.  Partial list of bipartite Bell inequalities with four binary settings , 2007, 0711.3362.

[45]  D. Matsukevich,et al.  Bell inequality violation with two remote atomic qubits. , 2008, Physical review letters.

[46]  Jens Eisert,et al.  Tomography of quantum detectors , 2009 .

[47]  Matthias Christandl,et al.  Postselection technique for quantum channels with applications to quantum cryptography. , 2008, Physical review letters.

[48]  R. Rosenfeld Nature , 2009, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.

[49]  T. V'ertesi,et al.  Quantum bounds on Bell inequalities , 2008, 0810.1615.

[50]  Dave Cliff,et al.  In/Proceedings of the 15th IEEE International Conference on the Engineering of Complex Computer Systems/ (ICECCS 2010), Oxford , 2010 .