Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2018 Jan 31;9(1):459.
doi: 10.1038/s41467-017-02307-4.

Practical device-independent quantum cryptography via entropy accumulation

Affiliations

Practical device-independent quantum cryptography via entropy accumulation

Rotem Arnon-Friedman et al. Nat Commun. .

Abstract

Device-independent cryptography goes beyond conventional quantum cryptography by providing security that holds independently of the quality of the underlying physical devices. Device-independent protocols are based on the quantum phenomena of non-locality and the violation of Bell inequalities. This high level of security could so far only be established under conditions which are not achievable experimentally. Here we present a property of entropy, termed "entropy accumulation", which asserts that the total amount of entropy of a large system is the sum of its parts. We use this property to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters. Recent experimental progress, which enabled loophole-free Bell tests, suggests that the achieved parameters are technologically accessible. Our work hence provides the theoretical groundwork for experimental demonstrations of device-independent cryptography.

PubMed Disclaimer

Conflict of interest statement

The authors declare that they have no competing financial interests.

Figures

Fig. 1
Fig. 1
The Clauser–Horne–Shimony–Holt game. Alice and Bob input bits, separately, into their parts of the shared device. Each part of the device supplies an output. The game is won if ab = x ⋅ y. The optimal winning probability in this game for a classical device is 75%. A quantum device can get up to approximately 86% by measuring the maximally entangled state Φ+ = 00+112 with the following measurements: Alice’s measurements x = 0 and x = 1 correspond to the Pauli operators σz and σx, respectively, and Bob’s measurements y = 0 and y = 1 to σz+σx2 and σz-σx2, respectively
Fig. 2
Fig. 2
Secrecy for the Clauser–Horne–Shimony–Holt game vs. winning probability. The amount of secret randomness is quantified by the conditional von Neumann entropy HAE. As soon as the winning probability is above the classical threshold of 75% some secret randomness is produced. The analytical bound is stated as Eq. (2)
Fig. 3
Fig. 3
An independent and identically distributed device vs. a general one. An independent and identically distributed (i.i.d.) device (left) is initialised in some (unknown) i.i.d. state σn; each “small device” is described by one copy of the same bipartite state σ and all copies are measured in the same way. A general device (right) is described by a bipartite quantum state ρ; in contrast to the i.i.d. case, any further division into subsystems is unknown. During the protocol, the state is measured through a sequential process: Alice and Bob use the device in the first round of the protocol and only then proceed to the second round, and so on
Fig. 4
Fig. 4
Sequential processes. Each map in the sequence Mi outputs Oi, which describes the information that should be kept secret, and Si, describing some side information leaked by the map, together with a “memory” system Ri, which gets passed on to the next map Mi+1. In each step, an additional classical value Ci is calculated from Oi and Si
Fig. 5
Fig. 5
Key rate in a DIQKD protocol. The plots show the key rate r as a function of a the quantum bit error rate Q and b the number of signals n. The completeness error, i.e., the probability that the protocol aborts when using an honest implementation of the device, e.g., due to statistical fluctuations, was chosen to be εQKDc=10-2. The soundness error, which quantifies the maximum tolerated deviation of the actual protocol from a hypothetical one where a perfectly random and completely secret key is produced for Alice and Bob, is taken to be εQKDs=10-5. Both of these values are considered to be realistic and relevant for actual applications. The rates are calculated using Eq. (35) which is derived in the Methods section
Fig. 6
Fig. 6
The construction of the min-tradeoff function fmin. The plot shows the values of the min-tradeoff function on a slice p~(0)+p~(1)=1-(1-γ)smax
Fig. 7
Fig. 7
Entropy rate for entropy accumulation protocol. ηopt(ωexp) for γ = 1, smax = 1 and several choices of δest, n, εEA, and εs. We optimise the rates over all parameters which are not explicitly stated in the figure. The dashed line shows the optimal asymptotic (n → ∞) rate under the assumption that the devices are such that Alice, Bob, and Eve share an (unknown) i.i.d. state and n → ∞

References

    1. Ekert A, Renner R. The ultimate physical limits of privacy. Nature. 2014;507:443–447. doi: 10.1038/nature13132. - DOI - PubMed
    1. Fung CHF, Qi B, Tamaki K, Lo HK. Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A. 2007;75:032314. doi: 10.1103/PhysRevA.75.032314. - DOI
    1. Lydersen L, et al. Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics. 2010;4:686–689. doi: 10.1038/nphoton.2010.214. - DOI
    1. Weier H, et al. Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors. New J. Phys. 2011;13:073024. doi: 10.1088/1367-2630/13/7/073024. - DOI
    1. Gerhardt I, et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2011;2:349. doi: 10.1038/ncomms1348. - DOI - PubMed

Publication types