Parallel Device-Independent Quantum Key Distribution

被引:0
作者
Jain, Rahul [1 ,2 ]
Miller, Carl A. [3 ,4 ]
Shi, Yaoyun [5 ]
机构
[1] Natl Univ Singapore, Ctr Quantum Technol, Singapore 117543, Singapore
[2] Nanyang Technol Univ, NUS, MajuLab, Int Joint Res Unit,CNRS,UCA,SU, Singapore 117546, Singapore
[3] Univ Maryland, Joint Ctr Quantum Informat & Comp Sci, College Pk, MD 20742 USA
[4] NIST, Gaithersburg, MD 20899 USA
[5] Alibaba Grp USA, Alibaba Quantum Lab, Bellevue, WA 98004 USA
基金
美国国家科学基金会; 新加坡国家研究基金会;
关键词
Bell inequalities; nonlocal games; parallel repetition; quantum self-testing; von Neumann entropy; quantum cryptography; certified randomness; UNCONDITIONAL SECURITY; CRYPTOGRAPHY;
D O I
10.1109/TIT.2020.2986740
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A prominent application of quantum cryptography is the distribution of cryptographic keys that are provably secure. Such security proofs were extended by Vazirani and Vidick (Physical Review Letters, 113, 140501, 2014) to the device-independent (DI) scenario, where the users do not need to trust the integrity of the underlying quantum devices. The protocols analyzed by them and by subsequent authors all require a sequential execution of N multiplayer games, where N is the security parameter. In this work, we prove the security of a protocol where all games are executed in parallel. Besides decreasing the number of time-steps necessary for key generation, this result reduces the security requirements for DI-QKD by allowing arbitrary information leakage of each user's inputs within his or her lab. To the best of our knowledge, this is the first parallel security proof for a fully device-independent QKD protocol. Our protocol tolerates a constant level of device imprecision and achieves a linear key rate.
引用
收藏
页码:5567 / 5584
页数:18
相关论文
共 37 条
  • [1] Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
    Adrian, David
    Bhargavan, Karthikeyan
    Durumeric, Zakir
    Gaudry, Pierrick
    Green, Matthew
    Halderman, J. Alex
    Heninger, Nadia
    Springall, Drew
    Thome, Emmanuel
    Valenta, Luke
    VanderSloot, Benjamin
    Wustrow, Eric
    Zanella-Beguelin, Santiago
    Zimmermann, Paul
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 5 - 17
  • [2] [Anonymous], 2017, ACM S THEORY COMPUT, DOI DOI 10.1145/3055399.3055433
  • [3] [Anonymous], 2003, PROC INT CONF DATA
  • [4] [Anonymous], 2015, LEIBNIZ INT PR INFOR, DOI DOI 10.4230/LIPICS.CCC.2015.512
  • [5] Arnon-Friedman R., 2016, ARXIV 1607 01797
  • [6] Practical device-independent quantum cryptography via entropy accumulation
    Arnon-Friedman, Rotem
    Dupuis, Frederic
    Fawzi, Omar
    Renner, Renato
    Vidick, Thomas
    [J]. NATURE COMMUNICATIONS, 2018, 9
  • [7] Unconditionally secure device-independent quantum key distribution with only two devices
    Barrett, Jonathan
    Colbeck, Roger
    Kent, Adrian
    [J]. PHYSICAL REVIEW A, 2012, 86 (06):
  • [8] Bavarian M., 2015, ARXIV150907466
  • [9] Ben-Or M, 2005, LECT NOTES COMPUT SC, V3378, P386
  • [10] Quantum cryptography: Public key distribution and coin tossing
    Bennett, Charles H.
    Brassard, Gilles
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 560 : 7 - 11