Semi-device-independent QKD Based on BB84 and a CHSH-Type Estimation

Device-independent quantum key distribution (QKD) aims to certify the security of a cryptographic key generated between two parties based only on the violation of a Bell inequality. This strongest possible form of QKD requires the manipulation of entanglement, and is thus impossible to implement in a one-way (“prepare and measure”) scheme. Here, we introduce a semi-device-independent QKD scheme in the prepare-and-measure configuration where the only assumption is a bound on the dimension of the Hilbert space, and prove its security against collective attacks. Our scheme can be understood as a modification of the original BB84 protocol where an extra CHSH-type estimation is carried out by Bob on the qubits sent by Alice.

[1]  Robert König,et al.  The Operational Meaning of Min- and Max-Entropy , 2008, IEEE Transactions on Information Theory.

[2]  Andrew Chi-Chih Yao,et al.  Self testing quantum apparatus , 2004, Quantum Inf. Comput..

[3]  Mark L Brongersma,et al.  Plasmonic beaming and active control over fluorescent emission. , 2011, Nature communications.

[4]  V. Scarani,et al.  Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.

[5]  C. Helstrom Quantum detection and estimation theory , 1969 .

[6]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[7]  A. Winter,et al.  Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[8]  Nicolas Brunner,et al.  Semi-device-independent security of one-way quantum key distribution , 2011, 1103.4105.

[9]  N. Gisin,et al.  OPTIMAL EAVESDROPPING IN QUANTUM CRYPTOGRAPHY. I. INFORMATION BOUND AND OPTIMAL STRATEGY , 1997 .

[10]  Renato Renner,et al.  Device-Independent Quantum Key Distribution with Commuting Measurements , 2010, ArXiv.

[11]  N. Gisin,et al.  Optimal Eavesdropping in Quantum Cryptography. I , 1997, quant-ph/9701039.

[12]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[13]  Adrian Kent,et al.  No signaling and quantum key distribution. , 2004, Physical review letters.

[14]  V. Scarani,et al.  Device-independent quantum key distribution secure against collective attacks , 2009, 0903.4460.

[15]  A. Acín,et al.  Secure device-independent quantum key distribution with causally independent measurement devices. , 2010, Nature communications.

[16]  Renato Renner,et al.  Efficient Device-Independent Quantum Key Distribution , 2010, EUROCRYPT.