Fully Device-Independent Quantum Key Distribution Using Synchronous Correlations

Authors Nishant Rodrigues , Brad Lackey



PDF
Thumbnail PDF

File

LIPIcs.TQC.2023.8.pdf
  • Filesize: 0.8 MB
  • 22 pages

Document Identifiers

Author Details

Nishant Rodrigues
  • Department of Computer Science, University of Maryland, College Park, MD, USA
  • Joint Center for Quantum Information and Computer Science, College Park, MD, USA
Brad Lackey
  • Microsoft Quantum, Redmond, WA, USA

Cite As Get BibTex

Nishant Rodrigues and Brad Lackey. Fully Device-Independent Quantum Key Distribution Using Synchronous Correlations. In 18th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 266, pp. 8:1-8:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023) https://doi.org/10.4230/LIPIcs.TQC.2023.8

Abstract

We derive a device-independent quantum key distribution protocol based on synchronous correlations and their Bell inequalities. This protocol offers several advantages over other device-independent schemes including symmetry between the two users and no need for pre-shared randomness. We close a "synchronicity" loophole by showing that an almost synchronous correlation inherits the self-testing property of the associated synchronous correlation. We also pose a new security assumption that closes the "locality" (or "causality") loophole: an unbounded adversary with even a small uncertainty about the users' choice of measurement bases cannot produce any almost synchronous correlation that approximately maximally violates a synchronous Bell inequality.

Subject Classification

ACM Subject Classification
  • Theory of computation → Cryptographic protocols
  • Hardware → Quantum communication and cryptography
  • Theory of computation → Quantum information theory
Keywords
  • quantum cryptography
  • device independence
  • key distribution
  • security proofs
  • randomness

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Antonio Acín, Nicolas Brunner, Nicolas Gisin, Serge Massar, Stefano Pironio, and Valerio Scarani. Device-independent security of quantum cryptography against collective attacks. Physical Review Letters, 98(23):230501, 2007. Google Scholar
  2. Werner Oskar Amrein and Kalyan B Sinha. On pairs of projections in a Hilbert space. Linear algebra and its applications, 208:425-435, 1994. Google Scholar
  3. Alex Arkhipov. Extending and characterizing quantum magic games. arXiv preprint arXiv:1209.3819, 2012. Google Scholar
  4. Rotem Arnon-Friedman, Renato Renner, and Thomas Vidick. Simple and tight device-independent security proofs. SIAM Journal on Computing, 48(1):181-225, 2019. Google Scholar
  5. Albrecht Böttcher and Ilya M Spitkovsky. A gentle guide to the basics of two projections theory. Linear Algebra and its Applications, 432(6):1412-1459, 2010. Google Scholar
  6. Richard Cleve, Peter Høyer, Benjamin Toner, and John Watrous. Consequences and limits of nonlocal strategies. In Computational Complexity, 2004. Proceedings. 19th IEEE Annual Conference on, pages 236-249. IEEE, 2004. Google Scholar
  7. Andrea Coladangelo and Jalex Stark. Robust self-testing for linear constraint system games. arXiv preprint arXiv:1709.09267, 2017. Google Scholar
  8. Frederic Dupuis, Omar Fawzi, and Renato Renner. Entropy accumulation. Communications in Mathematical Physics, 379(3):867-913, 2020. Google Scholar
  9. Marissa Giustina, Marijn AM Versteegh, Sören Wengerowsky, Johannes Handsteiner, Armin Hochrainer, Kevin Phelan, Fabian Steinlechner, Johannes Kofler, Jan-Åke Larsson, Carlos Abellán, et al. Significant-loophole-free test of bell’s theorem with entangled photons. Physical review letters, 115(25):250401, 2015. Google Scholar
  10. Paul R Halmos. Two subspaces. Transactions of the American Mathematical Society, 144:381-389, 1969. Google Scholar
  11. Bas Hensen, Hannes Bernien, Anaïs E Dréau, Andreas Reiserer, Norbert Kalb, Machiel S Blok, Just Ruitenberg, Raymond FL Vermeulen, Raymond N Schouten, Carlos Abellán, et al. Loophole-free bell inequality violation using electron spins separated by 1.3 kilometres. Nature, 526(7575):682-686, 2015. Google Scholar
  12. Zhengfeng Ji, Anand Natarajan, Thomas Vidick, John Wright, and Henry Yuen. MIP* = RE. arXiv preprint arXiv:2001.04383, 2020. Google Scholar
  13. Se-Jin Kim, Vern Paulsen, and Christopher Schafhauser. A synchronous game for binary constraint systems. Journal of Mathematical Physics, 59(3):032201, 2018. Google Scholar
  14. Laura Mancinska and David Roberson. Graph homomorphisms for quantum players. In 9th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2014). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2014. Google Scholar
  15. N David Mermin. Simple unified form for the major no-hidden-variables theorems. Physical review letters, 65(27):3373, 1990. Google Scholar
  16. Carl A Miller and Yaoyun Shi. Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices. Journal of the ACM (JACM), 63(4):1-63, 2016. Google Scholar
  17. Vern I Paulsen, Simone Severini, Daniel Stahlke, Ivan G Todorov, and Andreas Winter. Estimating quantum chromatic numbers. Journal of Functional Analysis, 270(6):2188-2222, 2016. Google Scholar
  18. Asher Peres. Incompatible results of quantum measurements. Physics Letters A, 151(3-4):107-108, 1990. Google Scholar
  19. Sandu Popescu and Daniel Rohrlich. Quantum nonlocality as an axiom. Foundations of Physics, 24(3):379-385, 1994. Google Scholar
  20. Nishant Rodrigues and Brad Lackey. Nonlocal games, synchronous correlations, and Bell inequalities. arXiv preprint arXiv:1707.06200v4, 2020. Google Scholar
  21. Lynden K Shalm, Evan Meyer-Scott, Bradley G Christensen, Peter Bierhorst, Michael A Wayne, Martin J Stevens, Thomas Gerrits, Scott Glancy, Deny R Hamel, Michael S Allman, et al. Strong loophole-free test of local realism. Physical review letters, 115(25):250402, 2015. Google Scholar
  22. Ben F Toner and Dave Bacon. Communication cost of simulating Bell correlations. Physical Review Letters, 91(18):187904, 2003. Google Scholar
  23. Umesh Vazirani and Thomas Vidick. Fully device-independent quantum key distribution. Physical Review Letters, 113(14):Art-No, 2014. Google Scholar
  24. Thomas Vidick. Almost synchronous quantum correlations. arXiv preprint arXiv:2103.02468, 2021. Google Scholar
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail