Do you want to publish a course? Click here

Towards practical device-independent quantum key distribution with spontaneous parametric downconversion sources, on-off photodetectors and entanglement swapping

66   0   0.0 ( 0 )
 Publication date 2015
  fields Physics
and research's language is English




Ask ChatGPT about the research

Device-independent quantum key distribution (DIQKD) guarantees unconditional security of secret key without making assumptions about the internal workings of the devices used. It does so using the loophole-free violation of a Bells inequality. The primary challenge in realizing DIQKD in practice is the detection loophole problem that is inherent to photonic tests of Bells inequalities over lossy channels. We revisit the proposal of Curty and Moroder [Phys. Rev. A 84, 010304(R) (2011)] to use a linear optics-based entanglement-swapping relay (ESR) to counter this problem. We consider realistic models for the entanglement sources and photodetectors; more precisely, (a) polarization-entangled states based on pulsed spontaneous parametric downconversion (SPDC) sources with infinitely higher order multi-photon components and multimode spectral structure, and (b) on-off photodetectors with non-unit efficiencies and non-zero dark count probabilities. We show that the ESR-based scheme is robust against the above imperfections and enables positive key rates at distances much larger than what is possible otherwise.



rate research

Read More

Device-independent quantum key distribution protocols allow two honest users to establish a secret key with minimal levels of trust on the provider, as security is proven without any assumption on the inner working of the devices used for the distribution. Unfortunately, the implementation of these protocols is challenging, as it requires the observation of a large Bell-inequality violation between the two distant users. Here, we introduce novel photonic protocols for device-independent quantum key distribution exploiting single-photon sources and heralding-type architectures. The heralding process is designed so that transmission losses become irrelevant for security. We then show how the use of single-photon sources for entanglement distribution in these architectures, instead of standard entangled-pair generation schemes, provides significant improvements on the attainable key rates and distances over previous proposals. Given the current progress in single-photon sources, our work opens up a promising avenue for device-independent quantum key distribution implementations.
Measurement-device-independent quantum key distribution (MDI-QKD) can eliminate all detector side-channel loopholes and has shown excellent performance in long-distance secret keys sharing. Conventional security proofs, however, require additional assumptions on sources and that can be compromised through uncharacterized side channels in practice. Here, we present a general formalism based on reference technique to prove the security of MDI-QKD against any possible sources imperfection and/or side channels. With this formalism, we investigate the asymptotic performance of single-photon sources without any extra assumptions on the state preparations. Our results highlight the importance of transmitters security.
To realize the practical implementation of device-independent quantum key distribution~(DIQKD), the main difficulty is that its security relies on the detection-loophole-free violation of the Clauser-Horne-Shimony-Holt~(CHSH) inequality, i.e. the CHSH value $S>2$, which is easily destroyed by the loss in transmission channels. One of the simplest methods to circumvent it is to utilize the entanglement swapping relay~(ESR). Here, we propose and experimentally test an improved version of the heralded nonlocality amplifier protocol based on the ESR, and numerically show that our scheme is much more robust against the transmission loss than the previously developed protocol. In the experiment, we observe that the obtained probability distribution is in excellent agreement with those expected by the numerical simulation with experimental parameters which are precisely characterized in a separate measurement. Moreover, we experimentally estimate the nonlocality of the heralded state after the transmission of 10~dB loss just before detection. It is estimated to be $S=2.104>2$, which indicates that our final state possesses strong nonlocality even with various experimental imperfections. Our result clarifies an important benchmark of the ESR protocol, and paves the way towards the long-distance realization of the loophole-free CHSH-violation as well as DIQKD.
In the implementation of device-independent quantum key distribution we are interested in maximizing the key rate, i.e. the number of key bits that can be obtained per signal, for a fixed security parameter. In the finite size regime, we furthermore also care about the minimum number of signals required before key can be obtained at all. Here, we perform a fully finite size analysis of device independent protocols using the CHSH inequality both for collective and coherent attacks. For coherent attacks, we sharpen the results recently derived in Arnon-Friedman et al., Nat. Commun. 9, 459 (2018), to reduce the minimum number of signals before key can be obtained. In the regime of collective attacks, where the devices are restricted to have no memory, we employ two different techniques that exploit this restriction to further reduce the number of signals. We then discuss experimental platforms in which DIQKD may be implemented. We analyse Bell violations and expected QBER achieved in previous Bell tests with distant setups and situate these parameters in the security analysis. Moreover, focusing on one of the experimental platforms, namely nitrogen-vacancy based systems, we describe experimental improvements that can lead to a device-independent quantum key distribution implementation in the near future.
Device-independent quantum key distribution (DIQKD) is the art of using untrusted devices to distribute secret keys in an insecure network. It thus represents the ultimate form of cryptography, offering not only information-theoretic security against channel attacks, but also against attacks exploiting implementation loopholes. In recent years, much progress has been made towards realising the first DIQKD experiments, but current proposals are just out of reach of todays loophole-free Bell experiments. Here, we significantly narrow the gap between the theory and practice of DIQKD with a simple variant of the original protocol based on the celebrated Clauser-Horne-Shimony-Holt (CHSH) Bell inequality. By using two randomly chosen key generating bases instead of one, we show that our protocol significantly improves over the original DIQKD protocol, enabling positive keys in the high noise regime for the first time. We also compute the finite-key security of the protocol for general attacks, showing that approximately 1E8 to 1E10 measurement rounds are needed to achieve positive rates using state-of-the-art experimental parameters. Our proposed DIQKD protocol thus represents a highly promising path towards the first realisation of DIQKD in practice.
comments
Fetching comments Fetching comments
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا