• Open Access

Security of Device-Independent Quantum Key Distribution in the Bounded-Quantum-Storage Model

S. Pironio, Ll. Masanes, A. Leverrier, and A. Acín
Phys. Rev. X 3, 031007 – Published 9 August 2013; Erratum Phys. Rev. X 4, 019901 (2014)

Abstract

Device-independent quantum key distribution (DIQKD) is a formalism that supersedes traditional quantum key distribution, as its security does not rely on any detailed modeling of the internal working of the devices. This strong form of security is only possible using devices producing correlations that violate a Bell inequality. Full security proofs of DIQKD have recently been reported, but they tolerate zero or small amounts of noise and are restricted to protocols based on specific Bell inequalities. Here, we provide a security proof of DIQKD that is both more efficient and noise resistant, and also more general, as it applies to protocols based on arbitrary Bell inequalities and can be adapted to cover supraquantum eavesdroppers limited by the no-signaling principle only. It is formulated, however, in the bounded-quantum-storage model, where an upper bound on the adversary’s quantum memory is a priori known. This condition is not a limitation at present, since the best existing quantum memories have very short coherence times.

  • Figure
  • Received 9 November 2012
  • Corrected 22 January 2014

DOI:https://doi.org/10.1103/PhysRevX.3.031007

This article is available under the terms of the Creative Commons Attribution 3.0 License. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI.

Published by the American Physical Society

Corrections

22 January 2014

Erratum

Authors & Affiliations

S. Pironio1, Ll. Masanes2,3, A. Leverrier4,5, and A. Acín2,6

  • 1Laboratoire d’Information Quantique, Université Libre de Bruxelles (ULB), 1050 Bruxelles, Belgium
  • 2ICFO-Institut de Ciencies Fotoniques, 08860 Castelldefels, Barcelona, Spain
  • 3H. H. Wills Physics Laboratory, University of Bristol, Tyndall Avenue, Bristol BS8 1TL, United Kingdom
  • 4Institute for Theoretical Physics, ETH Zurich, 8093 Zurich, Switzerland
  • 5INRIA Rocquencourt, Domaine de Voluceau, Boîte Postale 105, 78153 Le Chesnay Cedex, France
  • 6ICREA-Institució Catalana de Recerca i Estudis Avançats, 08010 Barcelona, Spain

Popular Summary

The fundamental attraction of quantum key distribution (QKD) comes from the fact that any attempt by an eavesdropper to crack a properly designed quantum key leaves an indelible “fingerprint” on the quantum messages exchanged by the communicating parties (Alice and Bob). Methods of coordinated detection of such fingerprints are at the center of a QKD security proof. Until very recently, crucial assumptions that are hard to meet in practice are invariably made in the standard QKD schemes about the devices Alice and Bob use. The notion of device-independent quantum key distribution (DIQKD) has emerged as an answer to that serious practical limitation. A main open question in this new direction is this: Is a general and practical security proof possible? In this paper, we make progress toward answering this question with a strong, if not absolute, “yes.”

In a DIQKD security proof, the security of the quantum key is certified by violation of a Bell inequality. The more forms of Bell inequality a security proof applies to, the more general or powerful it then is. While removing demands on the internal working of the devices, the DIQKD security proofs proposed so far have their own practical limitations. Some of them require the use of many devices; others do not tolerate any noise. One security proof proposed by Vidick and Vazirani uses only the minimal two devices and can, in principle, tolerate noise. But, it works only for a given form of Bell inequality and for low noise levels.

By comparison, our security proof makes gain in a number of ways: (i) It requires only two devices, (ii) it applies to any Bell inequality, and (iii) it tolerates noise levels that are realistic. All these advantages come at the price of assuming that the eavesdropper does not have a long-term quantum memory. This assumption, however, is rather reasonable, given the present quantum technology. Our work then implies that secure and practical device-independent quantum key distribution becomes possible under realistic assumptions.

Key Image

Article Text

Click to Expand

References

Click to Expand
Issue

Vol. 3, Iss. 3 — July - September 2013

Subject Areas
Reuse & Permissions
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review X

Reuse & Permissions

It is not necessary to obtain permission to reuse this article or its components as it is available under the terms of the Creative Commons Attribution 3.0 License. This license permits unrestricted use, distribution, and reproduction in any medium, provided attribution to the author(s) and the published article's title, journal citation, and DOI are maintained. Please note that some figures may have been included with permission from other third parties. It is your responsibility to obtain the proper permission from the rights holder directly for these figures.

×

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×