Device Independent Quantum Key Distribution Using Three-Party Pseudo-Telepathy

Removing trustworthiness from the devices is the motivation towards device independent quantum key distribution (DI-QKD). The only assumption in this case is that the devices obey the laws of quantum mechanics and are spatially isolated from each other. The security of the protocol can be achieved by certain tests based on various statistical analysis. Recently, Vidick and Vazirani (VV) proposed a DI-QKD scheme (Phys. Rev. Lett., 2014) exploiting the CHSH game. In a similar direction, here we present a simple proposal that exploits the idea of multi-party pseudo-telepathy game to certify device independent security. The relative advantages of our protocol are also discussed.

[1]  Robert König,et al.  The Operational Meaning of Min- and Max-Entropy , 2008, IEEE Transactions on Information Theory.

[2]  Stefano Pirandola,et al.  Side-channel-free quantum key distribution. , 2011, Physical review letters.

[3]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[4]  Laura Mancinska,et al.  Maximally Entangled State in Pseudo-Telepathy Games , 2015, Computing with New Resources.

[5]  S. Massar,et al.  Efficient quantum key distribution secure against no-signalling eavesdroppers , 2006, quant-ph/0605246.

[6]  Andrew Chi-Chih Yao,et al.  Quantum cryptography with imperfect apparatus , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).

[7]  G. Brassard,et al.  Quantum Pseudo-Telepathy , 2004, quant-ph/0407221.

[8]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[9]  M. Fejer,et al.  Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.

[10]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[11]  Yonggi Jo,et al.  Enhanced Bell state measurement for efficient measurement-device-independent quantum key distribution using 3-dimensional quantum states , 2019, Scientific Reports.

[12]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[13]  Ran Gelles,et al.  Semi-Quantum Key Distribution , 2008, ArXiv.

[14]  N. Gisin,et al.  From Bell's theorem to secure quantum key distribution. , 2005, Physical review letters.

[15]  Umesh V. Vazirani,et al.  Fully device independent quantum key distribution , 2012, Commun. ACM.

[16]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[17]  Peter Wittek,et al.  Efficient Device-Independent Entanglement Detection for Multipartite Systems , 2016, 1612.08551.

[18]  Serge Fehr,et al.  One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games , 2013, EUROCRYPT.

[19]  S. Wehner,et al.  A monogamy-of-entanglement game with applications to device-independent quantum cryptography , 2012, 1210.4359.

[20]  Gilles Brassard,et al.  Multi-party Pseudo-Telepathy , 2003, WADS.

[21]  Rahul Jain,et al.  Parallel Device-Independent Quantum Key Distribution , 2017, IEEE Transactions on Information Theory.

[22]  A. Shimony,et al.  Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .

[23]  V. Scarani,et al.  Secrecy extraction from no-signaling correlations , 2006, quant-ph/0606197.

[24]  Ueli Maurer,et al.  Indistinguishability of Random Systems , 2002, EUROCRYPT.