Long-distance device-independent quantum key distribution

Besides being a beautiful idea, device-independent quantum key distribution (DIQKD) is probably the ultimate solution to defeat quantum hacking. Its security is based on a loophole-free violation of a Bell inequality, which results in a very limited maximum achievable distance. To overcome this limitation, DIQKD must be furnished with heralding devices like, for instance, qubit amplifiers, which can signal the arrival of a photon before the measurement settings are actually selected. In this way, one can decouple channel loss from the selection of the measurement settings and, consequently, it is possible to safely post-select the heralded events and discard the rest, which results in a significant enhancement of the achievable distance. In this work, we investigate photonic-based DIQKD assisted by two main types of qubit amplifiers in the finite data block size scenario, and study the resources—particularly, the detection efficiency of the photodetectors and the quality of the entanglement sources—that would be necessary to achieve long-distance DIQKD within a reasonable time frame of signal transmission.

[1]  A. J. Shields,et al.  An avalanche-photodiode-based photon-number-resolving detector , 2008, 0807.0330.

[2]  Erik Woodhead,et al.  Device-independent quantum key distribution with single-photon sources , 2018, Quantum.

[3]  Nicolas Gisin,et al.  Faithful entanglement swapping based on sum-frequency generation. , 2011, Physical review letters.

[4]  J. S. BELLt Einstein-Podolsky-Rosen Paradox , 2018 .

[5]  P. Kok,et al.  Postselected versus nonpostselected quantum teleportation using parametric down-conversion , 1999, quant-ph/9903074.

[6]  Xiongfeng Ma,et al.  ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .

[7]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[8]  Xiongfeng Ma,et al.  High speed device-independent quantum random number generation without detection loophole , 2017, 2018 Conference on Lasers and Electro-Optics (CLEO).

[9]  Xiongfeng Ma,et al.  Efficient heralding of photonic qubits with applications to device-independent quantum key distribution , 2011, 1105.2811.

[10]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.

[11]  A. Acín,et al.  Secure device-independent quantum key distribution with causally independent measurement devices. , 2010, Nature communications.

[12]  Omar Fawzi,et al.  Entropy Accumulation , 2016, Communications in Mathematical Physics.

[13]  Li Qian,et al.  Proof-of-Principle Experimental Demonstration of Twin-Field Type Quantum Key Distribution. , 2019, Physical review letters.

[14]  Omar Fawzi,et al.  Entropy Accumulation With Improved Second-Order Term , 2018, IEEE Transactions on Information Theory.

[15]  W. Grice Arbitrarily complete Bell-state measurement using only linear optical elements , 2011 .

[16]  T. Ralph,et al.  Nondeterministic Noiseless Linear Amplification of Quantum Systems , 2009 .

[17]  F. Marsili,et al.  Detecting single infrared photons with 93% system efficiency , 2012, 1209.5774.

[18]  Christian Kurtsiefer,et al.  Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.

[19]  J. Skaar,et al.  Effects of detector efficiency mismatch on security of quantum cryptosystems , 2005, quant-ph/0511032.

[20]  Adam D. Smith,et al.  Leftover Hashing Against Quantum Side Information , 2011, IEEE Transactions on Information Theory.

[21]  W. Hoeffding Probability Inequalities for sums of Bounded Random Variables , 1963 .

[22]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[23]  Peter van Loock,et al.  3/4-Efficient Bell measurement with passive linear optics and unentangled ancillae. , 2014, Physical review letters.

[24]  Charles H. Bennett,et al.  WITHDRAWN: Quantum cryptography: Public key distribution and coin tossing , 2011 .

[25]  Omar Fawzi,et al.  M ay 2 01 8 Entropy accumulation with improved second-order , 2018 .

[26]  A. Shimony,et al.  Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .

[27]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[28]  S. Wehner,et al.  Bell Nonlocality , 2013, 1303.2849.

[29]  Andrew Chi-Chih Yao,et al.  Quantum cryptography with imperfect apparatus , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).

[30]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[31]  H. Lo,et al.  Quantum key distribution with triggering parametric down-conversion sources , 2008, 0803.2543.

[32]  N. Gisin,et al.  A local hidden variable model of quantum correlation exploiting the detection loophole , 1999 .

[33]  Masahide Sasaki,et al.  Progress towards practical device-independent quantum key distribution with spontaneous parametric down-conversion sources, on-off photodetectors, and entanglement swapping , 2015, 1512.06876.

[34]  Umesh V. Vazirani,et al.  Fully device independent quantum key distribution , 2012, Commun. ACM.

[35]  Gerd Leuchs,et al.  Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.

[36]  V. Scarani,et al.  Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.

[37]  A. Zeilinger,et al.  Significant-Loophole-Free Test of Bell's Theorem with Entangled Photons. , 2015, Physical review letters.

[38]  Adrian Kent,et al.  Memory attacks on device-independent quantum cryptography. , 2012, Physical review letters.

[39]  Christine Chen,et al.  Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.

[40]  S Wehner,et al.  Towards a realization of device-independent quantum key distribution , 2018, Quantum Science and Technology.

[41]  S. Wehner,et al.  Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres , 2015, Nature.

[42]  M. Curty,et al.  Secure quantum key distribution , 2014, Nature Photonics.

[43]  H. Lo,et al.  Quantum key distribution with entangled photon sources , 2007, quant-ph/0703122.

[44]  T. Moroder,et al.  Heralded-qubit amplifiers for practical device-independent quantum key distribution , 2011, 1105.2573.

[45]  Qiang Zhang,et al.  Experimental Twin-Field Quantum Key Distribution Through Sending-or-Not-Sending , 2019, Physical review letters.

[46]  Thomas Vidick,et al.  Practical device-independent quantum cryptography via entropy accumulation , 2018, Nature Communications.

[47]  Renato Renner,et al.  The ultimate physical limits of privacy , 2014, Nature.

[48]  Hoi-Kwong Lo,et al.  Foiling covert channels and malicious classical post-processing units in quantum key distribution , 2017, npj Quantum Information.

[49]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[50]  S. Massar,et al.  Efficient quantum key distribution secure against no-signalling eavesdroppers , 2006, quant-ph/0605246.

[51]  H. Weinfurter,et al.  Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors , 2011, 1101.5289.

[52]  Yaoyun Shi,et al.  Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices , 2014, STOC.

[53]  E. Knill,et al.  A strong loophole-free test of local realism , 2015, 2016 Conference on Lasers and Electro-Optics (CLEO).

[54]  N. Gisin,et al.  Proposal for implementing device-independent quantum key distribution based on a heralded qubit amplifier. , 2010, Physical review letters.

[55]  Marco Lucamarini,et al.  Experimental quantum key distribution beyond the repeaterless secret key capacity , 2019, Nature Photonics.

[56]  P. Pearle Hidden-Variable Example Based upon Data Rejection , 1970 .