Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks
The device-independent framework constitutes the most pragmatic approach to quantum protocols that does not put any trust in their implementations. It requires all claims, about e.g. security, to be made at the level of the final classical data in hands of the end-users. This imposes a great challen...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Verein zur Förderung des Open Access Publizierens in den Quantenwissenschaften
2023-12-01
|
Series: | Quantum |
Online Access: | https://quantum-journal.org/papers/q-2023-12-06-1199/pdf/ |
_version_ | 1797402914837233664 |
---|---|
author | Karol Łukanowski Maria Balanzó-Juandó Máté Farkas Antonio Acín Jan Kołodyński |
author_facet | Karol Łukanowski Maria Balanzó-Juandó Máté Farkas Antonio Acín Jan Kołodyński |
author_sort | Karol Łukanowski |
collection | DOAJ |
description | The device-independent framework constitutes the most pragmatic approach to quantum protocols that does not put any trust in their implementations. It requires all claims, about e.g. security, to be made at the level of the final classical data in hands of the end-users. This imposes a great challenge for determining attainable key rates in $\textit{device-independent quantum key distribution}$ (DIQKD), but also opens the door for consideration of eavesdropping attacks that stem from the possibility of a given data being just generated by a malicious third-party. In this work, we explore this path and present the $\textit{convex-combination attack}$ as an efficient, easy-to-use technique for upper-bounding DIQKD key rates. It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols, whether involving one-way or two-way communication. In particular, we demonstrate with its help that the currently predicted constraints on the robustness of DIQKD protocols to experimental imperfections, such as the finite visibility or detection efficiency, are already very close to the ultimate tolerable thresholds. |
first_indexed | 2024-03-09T02:31:02Z |
format | Article |
id | doaj.art-e39a90609347488793d5ea6ee9d3fb2c |
institution | Directory Open Access Journal |
issn | 2521-327X |
language | English |
last_indexed | 2024-03-09T02:31:02Z |
publishDate | 2023-12-01 |
publisher | Verein zur Förderung des Open Access Publizierens in den Quantenwissenschaften |
record_format | Article |
series | Quantum |
spelling | doaj.art-e39a90609347488793d5ea6ee9d3fb2c2023-12-06T14:30:13ZengVerein zur Förderung des Open Access Publizierens in den QuantenwissenschaftenQuantum2521-327X2023-12-017119910.22331/q-2023-12-06-119910.22331/q-2023-12-06-1199Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacksKarol ŁukanowskiMaria Balanzó-JuandóMáté FarkasAntonio AcínJan KołodyńskiThe device-independent framework constitutes the most pragmatic approach to quantum protocols that does not put any trust in their implementations. It requires all claims, about e.g. security, to be made at the level of the final classical data in hands of the end-users. This imposes a great challenge for determining attainable key rates in $\textit{device-independent quantum key distribution}$ (DIQKD), but also opens the door for consideration of eavesdropping attacks that stem from the possibility of a given data being just generated by a malicious third-party. In this work, we explore this path and present the $\textit{convex-combination attack}$ as an efficient, easy-to-use technique for upper-bounding DIQKD key rates. It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols, whether involving one-way or two-way communication. In particular, we demonstrate with its help that the currently predicted constraints on the robustness of DIQKD protocols to experimental imperfections, such as the finite visibility or detection efficiency, are already very close to the ultimate tolerable thresholds.https://quantum-journal.org/papers/q-2023-12-06-1199/pdf/ |
spellingShingle | Karol Łukanowski Maria Balanzó-Juandó Máté Farkas Antonio Acín Jan Kołodyński Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks Quantum |
title | Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks |
title_full | Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks |
title_fullStr | Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks |
title_full_unstemmed | Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks |
title_short | Upper bounds on key rates in device-independent quantum key distribution based on convex-combination attacks |
title_sort | upper bounds on key rates in device independent quantum key distribution based on convex combination attacks |
url | https://quantum-journal.org/papers/q-2023-12-06-1199/pdf/ |
work_keys_str_mv | AT karolłukanowski upperboundsonkeyratesindeviceindependentquantumkeydistributionbasedonconvexcombinationattacks AT mariabalanzojuando upperboundsonkeyratesindeviceindependentquantumkeydistributionbasedonconvexcombinationattacks AT matefarkas upperboundsonkeyratesindeviceindependentquantumkeydistributionbasedonconvexcombinationattacks AT antonioacin upperboundsonkeyratesindeviceindependentquantumkeydistributionbasedonconvexcombinationattacks AT jankołodynski upperboundsonkeyratesindeviceindependentquantumkeydistributionbasedonconvexcombinationattacks |