Details
Original language | English |
---|---|
Article number | 158 |
Journal | npj Quantum information |
Volume | 7 |
Issue number | 1 |
Early online date | 29 Oct 2021 |
Publication status | Published - Dec 2021 |
Externally published | Yes |
Abstract
Device-independent quantum key distribution (DIQKD) provides the strongest form of secure key exchange, using only the input–output statistics of the devices to achieve information-theoretic security. Although the basic security principles of DIQKD are now well understood, it remains a technical challenge to derive reliable and robust security bounds for advanced DIQKD protocols that go beyond the previous results based on violations of the CHSH inequality. In this work, we present a framework based on semidefinite programming that gives reliable lower bounds on the asymptotic secret key rate of any QKD protocol using untrusted devices. In particular, our method can in principle be utilized to find achievable secret key rates for any DIQKD protocol, based on the full input–output probability distribution or any choice of Bell inequality. Our method also extends to other DI cryptographic tasks.
ASJC Scopus subject areas
- Computer Science(all)
- Computer Science (miscellaneous)
- Physics and Astronomy(all)
- Statistical and Nonlinear Physics
- Computer Science(all)
- Computer Networks and Communications
- Computer Science(all)
- Computational Theory and Mathematics
Cite this
- Standard
- Harvard
- Apa
- Vancouver
- BibTeX
- RIS
In: npj Quantum information, Vol. 7, No. 1, 158, 12.2021.
Research output: Contribution to journal › Article › Research › peer review
}
TY - JOUR
T1 - Computing secure key rates for quantum cryptography with untrusted devices
AU - Tan, Ernest Y.Z.
AU - Schwonnek, René
AU - Goh, Koon Tong
AU - Primaatmaja, Ignatius William
AU - Lim, Charles C.W.
N1 - Publisher Copyright: © 2021, The Author(s).
PY - 2021/12
Y1 - 2021/12
N2 - Device-independent quantum key distribution (DIQKD) provides the strongest form of secure key exchange, using only the input–output statistics of the devices to achieve information-theoretic security. Although the basic security principles of DIQKD are now well understood, it remains a technical challenge to derive reliable and robust security bounds for advanced DIQKD protocols that go beyond the previous results based on violations of the CHSH inequality. In this work, we present a framework based on semidefinite programming that gives reliable lower bounds on the asymptotic secret key rate of any QKD protocol using untrusted devices. In particular, our method can in principle be utilized to find achievable secret key rates for any DIQKD protocol, based on the full input–output probability distribution or any choice of Bell inequality. Our method also extends to other DI cryptographic tasks.
AB - Device-independent quantum key distribution (DIQKD) provides the strongest form of secure key exchange, using only the input–output statistics of the devices to achieve information-theoretic security. Although the basic security principles of DIQKD are now well understood, it remains a technical challenge to derive reliable and robust security bounds for advanced DIQKD protocols that go beyond the previous results based on violations of the CHSH inequality. In this work, we present a framework based on semidefinite programming that gives reliable lower bounds on the asymptotic secret key rate of any QKD protocol using untrusted devices. In particular, our method can in principle be utilized to find achievable secret key rates for any DIQKD protocol, based on the full input–output probability distribution or any choice of Bell inequality. Our method also extends to other DI cryptographic tasks.
UR - http://www.scopus.com/inward/record.url?scp=85118443240&partnerID=8YFLogxK
U2 - 10.1038/s41534-021-00494-z
DO - 10.1038/s41534-021-00494-z
M3 - Article
AN - SCOPUS:85118443240
VL - 7
JO - npj Quantum information
JF - npj Quantum information
SN - 2056-6387
IS - 1
M1 - 158
ER -