Loading [MathJax]/extensions/tex2jax.js

Computing secure key rates for quantum cryptography with untrusted devices

Research output: Contribution to journalArticleResearchpeer review

Authors

  • Ernest Y.Z. Tan
  • René Schwonnek
  • Koon Tong Goh
  • Ignatius William Primaatmaja

External Research Organisations

  • ETH Zurich
  • University of Siegen
  • National University of Singapore

Details

Original languageEnglish
Article number158
Journalnpj Quantum information
Volume7
Issue number1
Early online date29 Oct 2021
Publication statusPublished - Dec 2021
Externally publishedYes

Abstract

Device-independent quantum key distribution (DIQKD) provides the strongest form of secure key exchange, using only the input–output statistics of the devices to achieve information-theoretic security. Although the basic security principles of DIQKD are now well understood, it remains a technical challenge to derive reliable and robust security bounds for advanced DIQKD protocols that go beyond the previous results based on violations of the CHSH inequality. In this work, we present a framework based on semidefinite programming that gives reliable lower bounds on the asymptotic secret key rate of any QKD protocol using untrusted devices. In particular, our method can in principle be utilized to find achievable secret key rates for any DIQKD protocol, based on the full input–output probability distribution or any choice of Bell inequality. Our method also extends to other DI cryptographic tasks.

ASJC Scopus subject areas

Cite this

Computing secure key rates for quantum cryptography with untrusted devices. / Tan, Ernest Y.Z.; Schwonnek, René; Goh, Koon Tong et al.
In: npj Quantum information, Vol. 7, No. 1, 158, 12.2021.

Research output: Contribution to journalArticleResearchpeer review

Tan EYZ, Schwonnek R, Goh KT, Primaatmaja IW, Lim CCW. Computing secure key rates for quantum cryptography with untrusted devices. npj Quantum information. 2021 Dec;7(1):158. Epub 2021 Oct 29. doi: 10.1038/s41534-021-00494-z
Download
@article{678cf55041f64d7f8dfc6fbf92a2fe88,
title = "Computing secure key rates for quantum cryptography with untrusted devices",
abstract = "Device-independent quantum key distribution (DIQKD) provides the strongest form of secure key exchange, using only the input–output statistics of the devices to achieve information-theoretic security. Although the basic security principles of DIQKD are now well understood, it remains a technical challenge to derive reliable and robust security bounds for advanced DIQKD protocols that go beyond the previous results based on violations of the CHSH inequality. In this work, we present a framework based on semidefinite programming that gives reliable lower bounds on the asymptotic secret key rate of any QKD protocol using untrusted devices. In particular, our method can in principle be utilized to find achievable secret key rates for any DIQKD protocol, based on the full input–output probability distribution or any choice of Bell inequality. Our method also extends to other DI cryptographic tasks.",
author = "Tan, {Ernest Y.Z.} and Ren{\'e} Schwonnek and Goh, {Koon Tong} and Primaatmaja, {Ignatius William} and Lim, {Charles C.W.}",
note = "Publisher Copyright: {\textcopyright} 2021, The Author(s).",
year = "2021",
month = dec,
doi = "10.1038/s41534-021-00494-z",
language = "English",
volume = "7",
journal = "npj Quantum information",
issn = "2056-6387",
publisher = "Nature Partner Journals",
number = "1",

}

Download

TY - JOUR

T1 - Computing secure key rates for quantum cryptography with untrusted devices

AU - Tan, Ernest Y.Z.

AU - Schwonnek, René

AU - Goh, Koon Tong

AU - Primaatmaja, Ignatius William

AU - Lim, Charles C.W.

N1 - Publisher Copyright: © 2021, The Author(s).

PY - 2021/12

Y1 - 2021/12

N2 - Device-independent quantum key distribution (DIQKD) provides the strongest form of secure key exchange, using only the input–output statistics of the devices to achieve information-theoretic security. Although the basic security principles of DIQKD are now well understood, it remains a technical challenge to derive reliable and robust security bounds for advanced DIQKD protocols that go beyond the previous results based on violations of the CHSH inequality. In this work, we present a framework based on semidefinite programming that gives reliable lower bounds on the asymptotic secret key rate of any QKD protocol using untrusted devices. In particular, our method can in principle be utilized to find achievable secret key rates for any DIQKD protocol, based on the full input–output probability distribution or any choice of Bell inequality. Our method also extends to other DI cryptographic tasks.

AB - Device-independent quantum key distribution (DIQKD) provides the strongest form of secure key exchange, using only the input–output statistics of the devices to achieve information-theoretic security. Although the basic security principles of DIQKD are now well understood, it remains a technical challenge to derive reliable and robust security bounds for advanced DIQKD protocols that go beyond the previous results based on violations of the CHSH inequality. In this work, we present a framework based on semidefinite programming that gives reliable lower bounds on the asymptotic secret key rate of any QKD protocol using untrusted devices. In particular, our method can in principle be utilized to find achievable secret key rates for any DIQKD protocol, based on the full input–output probability distribution or any choice of Bell inequality. Our method also extends to other DI cryptographic tasks.

UR - http://www.scopus.com/inward/record.url?scp=85118443240&partnerID=8YFLogxK

U2 - 10.1038/s41534-021-00494-z

DO - 10.1038/s41534-021-00494-z

M3 - Article

AN - SCOPUS:85118443240

VL - 7

JO - npj Quantum information

JF - npj Quantum information

SN - 2056-6387

IS - 1

M1 - 158

ER -

By the same author(s)