Generative Data Intelligence

Simple and practical DIQKD security analysis via BB84-type uncertainty relations and Pauli correlation constraints

Date:

Michele Masini, Stefano Pironio, and Erik Woodhead

Laboratoire d’Information Quantique, Université libre de Bruxelles (ULB), Belgium

Find this paper interesting or want to discuss? Scite or leave a comment on SciRate.

Abstract

According to the entropy accumulation theorem, proving the unconditional security of a device-independent quantum key distribution protocol reduces to deriving tradeoff functions, i.e., bounds on the single-round von Neumann entropy of the raw key as a function of Bell linear functionals, conditioned on an eavesdropper’s quantum side information. In this work, we describe how the conditional entropy can be bounded in the 2-input/2-output setting, where the analysis can be reduced to qubit systems, by combining entropy bounds for variants of the well-known BB84 protocol with quantum constraints on qubit operators on the bipartite system shared by Alice and Bob. The approach gives analytic bounds on the entropy, or semi-analytic ones in reasonable computation time, which are typically close to optimal. We illustrate the approach on a variant of the device-independent CHSH QKD protocol where both bases are used to generate the key as well as on a more refined analysis of the original single-basis variant with respect to losses. We obtain in particular a detection efficiency threshold slightly below 80.26%, within reach of current experimental capabilities.

Device-Independent Quantum Key Distribution (DIQKD) protocols allow, by exploiting the phenomenon of quantum nonlocality, two users to establish a secret key even when using quantum devices that they do not trust. We provide a new and versatile approach to compute lower bounds on the key rate of two-input/two-output DIQKD protocols (a family of DIQKD protocols that require only pairs of qubits for their implementation). We apply our method to different protocols, obtaining new results in terms of noise and photon loss tolerance.

► BibTeX data

► References

[1] John S. Bell. On the Einstein Podolsky Rosen paradox. Physics, 1 (3): 195–200, 1964. URL http:/​/​cds.cern.ch/​record/​111654/​.
http:/​/​cds.cern.ch/​record/​111654/​

[2] Nicolas Brunner, Daniel Cavalcanti, Stefano Pironio, Valerio Scarani, and Stephanie Wehner. Bell nonlocality. Rev. Mod. Phys., 86: 419–478, Apr 2014. 10.1103/​RevModPhys.86.419.
https:/​/​doi.org/​10.1103/​RevModPhys.86.419

[3] Antonio Acín, Nicolas Brunner, Nicolas Gisin, Serge Massar, Stefano Pironio, and Valerio Scarani. Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett., 98: 230501, Jun 2007. 10.1103/​PhysRevLett.98.230501.
https:/​/​doi.org/​10.1103/​PhysRevLett.98.230501

[4] DP Nadlinger, P Drmota, BC Nichol, G Araneda, D Main, R Srinivas, DM Lucas, CJ Ballance, K Ivanov, EY-Z Tan, et al. Experimental quantum key distribution certified by bell’s theorem. Nature, 607 (7920): 682–686, 2022. 10.1038/​s41586-022-04941-5.
https:/​/​doi.org/​10.1038/​s41586-022-04941-5

[5] Wei Zhang, Tim van Leent, Kai Redeker, Robert Garthoff, René Schwonnek, Florian Fertig, Sebastian Eppelt, Wenjamin Rosenfeld, Valerio Scarani, Charles C-W Lim, et al. A device-independent quantum key distribution system for distant users. Nature, 607 (7920): 687–691, 2022. 10.1038/​s41586-022-04891-y.
https:/​/​doi.org/​10.1038/​s41586-022-04891-y

[6] Wen-Zhao Liu, Yu-Zhe Zhang, Yi-Zheng Zhen, Ming-Han Li, Yang Liu, Jingyun Fan, Feihu Xu, Qiang Zhang, and Jian-Wei Pan. Toward a photonic demonstration of device-independent quantum key distribution. Phys. Rev. Lett., 129 (5): 050502, 2022. 10.1103/​PhysRevLett.129.050502.
https:/​/​doi.org/​10.1103/​PhysRevLett.129.050502

[7] Rotem Arnon-Friedman, Frédéric Dupuis, Omar Fawzi, Renato Renner, and Thomas Vidick. Practical device-independent quantum cryptography via entropy accumulation. Nat. Commun., 9: 459, Jan 2018. 10.1038/​s41467-017-02307-4.
https:/​/​doi.org/​10.1038/​s41467-017-02307-4

[8] Yanbao Zhang, Honghao Fu, and Emanuel Knill. Efficient randomness certification by quantum probability estimation. Phys. Rev. Research, 2: 013016, Jan 2020. 10.1103/​PhysRevResearch.2.013016.
https:/​/​doi.org/​10.1103/​PhysRevResearch.2.013016

[9] Ernest Y-Z Tan, René Schwonnek, Koon Tong Goh, Ignatius William Primaatmaja, and Charles C-W Lim. Computing secure key rates for quantum cryptography with untrusted devices. npj Quantum Information, 7 (1): 1–6, 2021. 10.1038/​s41534-021-00494-z.
https:/​/​doi.org/​10.1038/​s41534-021-00494-z

[10] René Schwonnek, Koon Tong Goh, Ignatius W. Primaatmaja, Ernest Y.-Z. Tan, Ramona Wolf, Valerio Scarani, and Charles C.-W. Lim. Device-independent quantum key distribution with random key basis. Nat. Commun., May 2021. 10.1038/​s41467-021-23147-3.
https:/​/​doi.org/​10.1038/​s41467-021-23147-3

[11] Ernest Y.-Z. Tan, Pavel Sekatski, Jean-Daniel Bancal, René Schwonnek, Renato Renner, Nicolas Sangouard, and Charles C.-W. Lim. Improved DIQKD protocols with finite-size analysis. Dec 2020. URL https:/​/​doi.org/​10.48550/​arXiv.2012.08714.
https:/​/​doi.org/​10.48550/​arXiv.2012.08714

[12] Peter Brown, Hamza Fawzi, and Omar Fawzi. Computing conditional entropies for quantum correlations. Nat. Commun., 12: 575, Jan 2021a. 10.1038/​s41467-020-20018-1.
https:/​/​doi.org/​10.1038/​s41467-020-20018-1

[13] Peter Brown, Hamza Fawzi, and Omar Fawzi. Device-independent lower bounds on the conditional von neumann entropy. Jun 2021b. URL https:/​/​doi.org/​10.48550/​arXiv.2106.13692.
https:/​/​doi.org/​10.48550/​arXiv.2106.13692

[14] Erik Woodhead, Antonio Acín, and Stefano Pironio. Device-independent quantum key distribution with asymmetric CHSH inequalities. Quantum, 5: 443, Apr 2021. 10.22331/​q-2021-04-26-443.
https:/​/​doi.org/​10.22331/​q-2021-04-26-443

[15] Renato Renner, Nicolas Gisin, and Barbara Kraus. Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A, 72: 012332, Jul 2005. 10.1103/​PhysRevA.72.012332.
https:/​/​doi.org/​10.1103/​PhysRevA.72.012332

[16] Oliver Kern and Joseph M. Renes. Improved one-way rates for BB84 and 6-state protocols. Quantum Inf. Comput., 8 (8,9): 0756–0772, Sep 2008. 10.26421/​QIC8.8-9-6.
https:/​/​doi.org/​10.26421/​QIC8.8-9-6

[17] Igor Devetak and Andreas Winter. Distillation of secret key and entanglement from quantum states. Proc. R. Soc. A, 461 (2053): 207–235, Jan 2005. 10.1098/​rspa.2004.1372.
https:/​/​doi.org/​10.1098/​rspa.2004.1372

[18] Stefano Pironio, Antonio Acín, Nicolas Brunner, Nicolas Gisin, Serge Massar, and Valerio Scarani. Device-independent quantum key distribution secure against collective attacks. New J. Phys., 11 (4): 045021, Apr 2009. 10.1088/​1367-2630/​11/​4/​045021.
https:/​/​doi.org/​10.1088/​1367-2630/​11/​4/​045021

[19] Mario Berta, Matthias Christandl, Roger Colbeck, Joseph M. Renes, and Renato Renner. The uncertainty principle in the presence of quantum memory. Nature Phys., 6: 659–662, Jul 2010. 10.1038/​nphys1734.
https:/​/​doi.org/​10.1038/​nphys1734

[20] Erik Woodhead. Tight asymptotic key rate for the Bennett-Brassard 1984 protocol with local randomization and device imprecisions. Phys. Rev. A, 90: 022306, Aug 2014. 10.1103/​PhysRevA.90.022306.
https:/​/​doi.org/​10.1103/​PhysRevA.90.022306

[21] Jean B. Lasserre. Global optimization with polynomials and the problem of moments. SIAM J. Comput., 11: 796–817, 2001. 10.1137/​S1052623400366802.
https:/​/​doi.org/​10.1137/​S1052623400366802

[22] D. Henrion and J.-B. Lasserre. Convergent relaxations of polynomial matrix inequalities and static output feedback. IEEE Trans. Autom. Control, 51 (2): 192–202, 2006. 10.1109/​TAC.2005.863494.
https:/​/​doi.org/​10.1109/​TAC.2005.863494

[23] Duncan McCallum and David Avis. A linear algorithm for finding the convex hull of a simple polygon. Information Processing Letters, 9 (5): 201–206, Dec 1979. ISSN 0020-0190. 10.1016/​0020-0190(79)90069-3.
https:/​/​doi.org/​10.1016/​0020-0190(79)90069-3

[24] Alejandro A. Schäffer and Christopher J. Van Wyk. Convex hulls of piecewise-smooth Jordan curves. J. Algorithms, 8 (1): 66–94, Mar 1987. ISSN 0196-6774. 10.1016/​0196-6774(87)90028-9.
https:/​/​doi.org/​10.1016/​0196-6774(87)90028-9

[25] Erik Woodhead. Quantum cloning bound and application to quantum key distribution. Phys. Rev. A, 88: 012331, Jul 2013. 10.1103/​PhysRevA.88.012331.
https:/​/​doi.org/​10.1103/​PhysRevA.88.012331

[26] Rutvij Bhavsar, Sammy Ragy, and Roger Colbeck. Calculation and application of various von Neumann entropies in CHSH-based device-independent randomness expansion. Mar 2021. URL https:/​/​doi.org/​10.48550/​arXiv.2103.07504.
https:/​/​doi.org/​10.48550/​arXiv.2103.07504

[27] Philippe H. Eberhard. Background level and counter efficiencies required for a loophole-free Einstein-Podolsky-Rosen experiment. Phys. Rev. A, 47: R747–R750, Feb 1993. 10.1103/​PhysRevA.47.R747.
https:/​/​doi.org/​10.1103/​PhysRevA.47.R747

[28] Peter Brown. private communication.

[29] Xingjian Zhang, Pei Zeng, Tian Ye, Hoi-Kwong Lo, and Xiongfeng Ma. Quantum complementarity approach to device-independent security. Nov 2021. URL https:/​/​doi.org/​10.48550/​arXiv.2111.13855.
https:/​/​doi.org/​10.48550/​arXiv.2111.13855

[30] Adam Winick, Norbert Lütkenhaus, and Patrick J. Coles. Reliable numerical key rates for quantum key distribution. Quantum, 2: 77, Jul 2018. 10.22331/​q-2018-07-26-77.
https:/​/​doi.org/​10.22331/​q-2018-07-26-77

[31] N. David Mermin. Extreme quantum entanglement in a superposition of macroscopically distinct states. Phys. Rev. Lett., 65: 1838–1840, Oct 1990. 10.1103/​PhysRevLett.65.1838.
https:/​/​doi.org/​10.1103/​PhysRevLett.65.1838

[32] Federico Grasselli, Gláucia Murta, Hermann Kampermann, and Dagmar Bruß. Entropy bounds for multiparty device-independent cryptography. PRX Quantum, 2: 010308, Jan 2021. 10.1103/​PRXQuantum.2.010308.
https:/​/​doi.org/​10.1103/​PRXQuantum.2.010308

[33] https:/​/​github.com/​MicheleMasini1996/​diqkd-2input2output.
https:/​/​github.com/​MicheleMasini1996/​diqkd-2input2output

[34] Stefano Pironio, Antonio Acín, Serge Massar, Antoine Boyer de La Giroday, Dzmitry N. Matsukevich, Peter Maunz, Steven Olmschenk, David Hayes, Le Luo, T. Andrew Manning, and Christopher Monroe. Random numbers certified by Bell’s theorem. Nature, 464: 1021–1024, Apr 2010. 10.1038/​nature09008.
https:/​/​doi.org/​10.1038/​nature09008

[35] Antonio Acín, Serge Massar, and Stefano Pironio. Randomness versus nonlocality and entanglement. Phys. Rev. Lett., 108: 100402, Mar 2012. 10.1103/​PhysRevLett.108.100402.
https:/​/​doi.org/​10.1103/​PhysRevLett.108.100402

Cited by

[1] D. P. Nadlinger, P. Drmota, B. C. Nichol, G. Araneda, D. Main, R. Srinivas, D. M. Lucas, C. J. Ballance, K. Ivanov, E. Y. -Z. Tan, P. Sekatski, R. L. Urbanke, R. Renner, N. Sangouard, and J. -D. Bancal, “Experimental quantum key distribution certified by Bell’s theorem”, Nature 607 7920, 682 (2022).

[2] Lewis Wooltorton, Peter Brown, and Roger Colbeck, “Tight Analytic Bound on the Trade-Off between Device-Independent Randomness and Nonlocality”, Physical Review Letters 129 15, 150403 (2022).

[3] Víctor Zapatero, Tim van Leent, Rotem Arnon-Friedman, Wen-Zhao Liu, Qiang Zhang, Harald Weinfurter, and Marcos Curty, “Advances in device-independent quantum key distribution”, arXiv:2208.12842.

[4] Karol Łukanowski, Maria Balanzó-Juandó, Máté Farkas, Antonio Acín, and Jan Kołodyński, “Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks”, arXiv:2206.06245.

[5] Federico Grasselli, Gláucia Murta, Hermann Kampermann, and Dagmar Bruß, “Boosting device-independent cryptography with tripartite nonlocality”, arXiv:2209.12828.

The above citations are from SAO/NASA ADS (last updated successfully 2022-10-20 13:55:29). The list may be incomplete as not all publishers provide suitable and complete citation data.

Could not fetch Crossref cited-by data during last attempt 2022-10-20 13:55:28: Could not fetch cited-by data for 10.22331/q-2022-10-20-843 from Crossref. This is normal if the DOI was registered recently.

spot_img

Latest Intelligence

spot_img

Chat with us

Hi there! How can I help you?