Device-independent quantum key distribution from generalized CHSH inequalities

Device-independent quantum key distribution aims at providing security guarantees even when using largely uncharacterised devices. In the simplest scenario, these guarantees are derived from the CHSH score, which is a simple linear combination of four correlation functions. We here derive a security proof from a generalisation of the CHSH score, which effectively takes into account the individual values of two correlation functions. We show that this additional information, which is anyway available in practice, allows one to get higher key rates than with the CHSH score. We discuss the potential advantage of this technique for realistic photonic implementations of device-independent quantum key distribution.

[1]  L. Mirsky A trace inequality of John von Neumann , 1975 .

[2]  B Kraus,et al.  Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. , 2004, Physical review letters.

[3]  A. Zeilinger,et al.  Significant-Loophole-Free Test of Bell's Theorem with Entangled Photons. , 2015, Physical review letters.

[4]  T. F. D. Silva,et al.  Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits , 2012, 1207.6345.

[5]  Stefano Pirandola,et al.  Side-channel-free quantum key distribution. , 2011, Physical review letters.

[6]  Aaron J. Miller,et al.  Detection-loophole-free test of quantum nonlocality, and applications. , 2013, Physical review letters.

[7]  Pavel Sekatski,et al.  What is the minimum CHSH score certifying that a state resembles the singlet? , 2020, Quantum.

[8]  P. Sekatski,et al.  Noisy Preprocessing Facilitates a Photonic Realization of Device-Independent Quantum Key Distribution. , 2020, Physical review letters.

[9]  H. Weinfurter,et al.  Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors , 2011, 1101.5289.

[10]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[11]  Isaac L. Chuang,et al.  Quantum Computation and Quantum Information (10th Anniversary edition) , 2011 .

[12]  Ivan vSupi'c,et al.  Self-testing of quantum systems: a review , 2019, Quantum.

[13]  R. Penty,et al.  Quantum key distribution without detector vulnerabilities using optically seeded lasers , 2015, Nature Photonics.

[14]  Umesh V. Vazirani,et al.  Robust device independent quantum key distribution , 2014, ITCS.

[15]  Eberhard,et al.  Background level and counter efficiencies required for a loophole-free Einstein-Podolsky-Rosen experiment. , 1993, Physical review. A, Atomic, molecular, and optical physics.

[16]  Graeme Smith,et al.  Noisy processing and distillation of private quantum States. , 2007, Physical review letters.

[17]  Li Qian,et al.  Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.

[18]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[19]  A. Winter,et al.  Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[20]  Xiongfeng Ma,et al.  Improved data post-processing in quantum key distribution and application to loss thresholds in device independent QKD , 2011, Quantum Inf. Comput..

[21]  A. Zeilinger,et al.  Bell violation using entangled photons without the fair-sampling assumption , 2012, Nature.

[22]  Yang Liu,et al.  Device-independent quantum random-number generation , 2018, Nature.

[23]  Pavel Sekatski,et al.  Setting up experimental Bell test with reinforcement learning , 2020, Physical review letters.

[24]  Le Phuc Thinh,et al.  Randomness Extraction from Bell Violation with Continuous Parametric Down-Conversion. , 2018, Physical review letters.

[25]  R. Renner,et al.  Information-theoretic security proof for quantum-key-distribution protocols , 2005, quant-ph/0502064.

[26]  Shihan Sajeed,et al.  Attacking quantum key distribution by light injection via ventilation openings , 2020, PloS one.

[28]  N. Gisin,et al.  From Bell's theorem to secure quantum key distribution. , 2005, Physical review letters.

[29]  I Lucio-Martinez,et al.  Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.

[30]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[31]  E. Knill,et al.  A strong loophole-free test of local realism , 2015, 2016 Conference on Lasers and Electro-Optics (CLEO).

[32]  M. Fejer,et al.  Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.

[33]  Thomas Vidick,et al.  Practical device-independent quantum cryptography via entropy accumulation , 2018, Nature Communications.

[34]  Christine Chen,et al.  Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.

[35]  V. Scarani,et al.  Device-independent quantum key distribution secure against collective attacks , 2009, 0903.4460.

[36]  J. Bancal,et al.  What is the minimum CHSH score certifying that a state resembles the singlet? , 2019, Quantum.