Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks

The device-independent framework constitutes the most pragmatic approach to quantum protocols that does not put any trust in their implementations. It requires all claims, about e.g. security, to be made at the level of the final classical data in hands of the end-users. This imposes a great challen...

Full description

Bibliographic Details
Main Authors: Karol Łukanowski, Maria Balanzó-Juandó, Máté Farkas, Antonio Acín, Jan Kołodyński
Format: Article
Language:English
Published: Verein zur Förderung des Open Access Publizierens in den Quantenwissenschaften 2023-12-01
Series:Quantum
Online Access:https://quantum-journal.org/papers/q-2023-12-06-1199/pdf/
_version_ 1797402914837233664
author Karol Łukanowski
Maria Balanzó-Juandó
Máté Farkas
Antonio Acín
Jan Kołodyński
author_facet Karol Łukanowski
Maria Balanzó-Juandó
Máté Farkas
Antonio Acín
Jan Kołodyński
author_sort Karol Łukanowski
collection DOAJ
description The device-independent framework constitutes the most pragmatic approach to quantum protocols that does not put any trust in their implementations. It requires all claims, about e.g. security, to be made at the level of the final classical data in hands of the end-users. This imposes a great challenge for determining attainable key rates in $\textit{device-independent quantum key distribution}$ (DIQKD), but also opens the door for consideration of eavesdropping attacks that stem from the possibility of a given data being just generated by a malicious third-party. In this work, we explore this path and present the $\textit{convex-combination attack}$ as an efficient, easy-to-use technique for upper-bounding DIQKD key rates. It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols, whether involving one-way or two-way communication. In particular, we demonstrate with its help that the currently predicted constraints on the robustness of DIQKD protocols to experimental imperfections, such as the finite visibility or detection efficiency, are already very close to the ultimate tolerable thresholds.
first_indexed 2024-03-09T02:31:02Z
format Article
id doaj.art-e39a90609347488793d5ea6ee9d3fb2c
institution Directory Open Access Journal
issn 2521-327X
language English
last_indexed 2024-03-09T02:31:02Z
publishDate 2023-12-01
publisher Verein zur Förderung des Open Access Publizierens in den Quantenwissenschaften
record_format Article
series Quantum
spelling doaj.art-e39a90609347488793d5ea6ee9d3fb2c2023-12-06T14:30:13ZengVerein zur Förderung des Open Access Publizierens in den QuantenwissenschaftenQuantum2521-327X2023-12-017119910.22331/q-2023-12-06-119910.22331/q-2023-12-06-1199Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacksKarol ŁukanowskiMaria Balanzó-JuandóMáté FarkasAntonio AcínJan KołodyńskiThe device-independent framework constitutes the most pragmatic approach to quantum protocols that does not put any trust in their implementations. It requires all claims, about e.g. security, to be made at the level of the final classical data in hands of the end-users. This imposes a great challenge for determining attainable key rates in $\textit{device-independent quantum key distribution}$ (DIQKD), but also opens the door for consideration of eavesdropping attacks that stem from the possibility of a given data being just generated by a malicious third-party. In this work, we explore this path and present the $\textit{convex-combination attack}$ as an efficient, easy-to-use technique for upper-bounding DIQKD key rates. It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols, whether involving one-way or two-way communication. In particular, we demonstrate with its help that the currently predicted constraints on the robustness of DIQKD protocols to experimental imperfections, such as the finite visibility or detection efficiency, are already very close to the ultimate tolerable thresholds.https://quantum-journal.org/papers/q-2023-12-06-1199/pdf/
spellingShingle Karol Łukanowski
Maria Balanzó-Juandó
Máté Farkas
Antonio Acín
Jan Kołodyński
Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks
Quantum
title Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks
title_full Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks
title_fullStr Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks
title_full_unstemmed Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks
title_short Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks
title_sort upper bounds on key rates in device independent quantum key distribution based on convex combination attacks
url https://quantum-journal.org/papers/q-2023-12-06-1199/pdf/
work_keys_str_mv AT karolłukanowski upperboundsonkeyratesindeviceindependentquantumkeydistributionbasedonconvexcombinationattacks
AT mariabalanzojuando upperboundsonkeyratesindeviceindependentquantumkeydistributionbasedonconvexcombinationattacks
AT matefarkas upperboundsonkeyratesindeviceindependentquantumkeydistributionbasedonconvexcombinationattacks
AT antonioacin upperboundsonkeyratesindeviceindependentquantumkeydistributionbasedonconvexcombinationattacks
AT jankołodynski upperboundsonkeyratesindeviceindependentquantumkeydistributionbasedonconvexcombinationattacks