Receiver-device-independent quantum key distribution protocols

We discuss quantum key distribution protocols and their security analysis, considering a receiver-device-independent (RDI) model. The sender’s (Alice’s) device is partially characterized, in the sense that we assume bounds on the overlaps of the prepared quantum states. The receiver’s (Bob’s) device...

Full description

Bibliographic Details
Main Authors: Marie Ioannou, Pavel Sekatski, Alastair A Abbott, Denis Rosset, Jean-Daniel Bancal, Nicolas Brunner
Format: Article
Language:English
Published: IOP Publishing 2022-01-01
Series:New Journal of Physics
Subjects:
Online Access:https://doi.org/10.1088/1367-2630/ac71bc
Description
Summary:We discuss quantum key distribution protocols and their security analysis, considering a receiver-device-independent (RDI) model. The sender’s (Alice’s) device is partially characterized, in the sense that we assume bounds on the overlaps of the prepared quantum states. The receiver’s (Bob’s) device requires no characterisation and can be represented as a black-box. Our protocols are therefore robust to any attack on Bob, such as blinding attacks. In particular, we show that a secret key can be established even when the quantum channel has arbitrarily low transmission by considering RDI protocols exploiting sufficiently many states. Finally, we discuss how the hypothesis of bounded overlaps can be naturally applied to practical devices.
ISSN:1367-2630