Contributed Talks 2b: Device independence: theory and experiment (Chairs: Qiang Zhang and Vadim Makarov)
contributed
Tue, 11 Aug
, 11:45 - 12:15
- Robust device-independent quantum key distributionRene Schwonnek (NUS/ECE); Koon Tong Goh (NUS/ECE); Ignatius W. Primaatmaja (NUS/CQT); Ernest Y.-Z. Tan (ETHZ); Ramona Wolf (Leibniz Universität Hannover); Valerio Scarani (NUS/Physics/CQT); Charles C.-W. Lim (NUS/ECE/CQT)[abstract]Abstract: Device-independent quantum key distribution (DIQKD) is the art of using untrusted devices to distribute secret keys in an unsecure network. It thus represents the ultimate form of cryptography, offering not only information-theoretic security against channel attacks, but also against attacks exploiting implementation loopholes~\cite{lydersen2010hacking}. At its heart, DIQKD utilises nonlocal correlations---detected and certified by a Bell inequality---to establish secret correlations between the users. In recent years, much progress has been made towards realising the first DIQKD experiments, but current proposals are just out of reach of today’s loophole-free Bell experiments. Here, in this work, we close the gap between the theory and practice of DIQKD with a simple variant of the original protocol based on the celebrated Clauser-Horne-Shimony-Holt (CHSH) Bell inequality. In using two randomly chosen key generating bases instead of one, we show that the noise tolerance of DIQKD can be significantly improved. In particular, the extended feasibility region now covers some of the most recent loophole-free CHSH experiments, hence indicating that the first realisation of DIQKD already lies within the range of these experiments.Presenter live session: Ernest Tansubmission #98
- Device-independent randomness expansion against quantum side informationWen-Zhao Liu (University of Science and Technology of China); Ming-Han Li (University of Science and Technology of China); Sammy Ragy (University of York); Si-Ran Zhao (University of Science and Technology of China); Bing Bai (University of Science and Technology of China); Yang Liu (University of Science and Technology of China); Peter J. Brown (University of York); Jun Zhang (University of Science and Technology of China); Roger Colbeck (University of York); Jingyun Fan (Southern University of Science and Technology); Qiang Zhang (University of Science and Technology of China); Jian-Wei Pan (University of Science and Technology of China)[abstract]Abstract: The ability to produce random numbers that are unknown to any outside party is crucial for many applications. Device-independent randomness generation (DIRNG) allows new randomness to be provably generated, without needing to trust the devices used for the protocol. This provides strong guarantees about the security of the output, but comes at the price of requiring the violation of a Bell inequality to implement. A further challenge is to make the bounds in the security proofs tight enough to allow expansion with contemporary technology. Thus, while randomness has been generated in recent experiments, the amount of randomness consumed in doing so has been too high to certify expansion based on existing theory. Here we present an experiment that demonstrates device-independent randomness expansion (DIRNE), i.e., where the generated randomness surpasses that consumed. By developing a loophole-free Bell test setup with a single photon detection efficiency of around 81% and exploiting a spot-checking protocol, we achieve a net gain of 2.63 × 10^8 certified bits with soundness error 5.74×10^{−8}. The experiment ran for 220 hours corresponding to an average rate of randomness generation of 8202 bits/s. By developing the Entropy Accumulation Theorem (EAT), we established security against quantum adversaries. We anticipate that this work will lead to further improvements that push device-independence towards commercial viability.Presenter live session: Wen-Zhao Liusubmission #104
- Device-independent Randomness Expansion with Entangled PhotonsYanbao Zhang (NTT Basic Research Lab); Lynden K. Shalm (NIST-Boulder); Joshua C. Bienfang (NIST-Maryland); Collin Schlager (NIST-Boulder); Martin J. Stevens (NIST-Boulder); Michael D. Mazurek (NIST-Boulder); Carlos Abellan (Barcelona Institute of Science and Technology); Waldimar Amaya (Barcelona Institute of Science and Technology); Morgan W. Mitchell (Barcelona Institute of Science and Technology); Mohammad A. Alhejji (University of Colorado Boulder); Honghao Fu (University of Maryland); Joel Ornstein (University of Colorado Boulder); Richard P. Mirin (NIST-Boulder); Sae Woo Nam (NIST-Boulder); Emanuel Knill (NIST-Boulder)[abstract]Abstract: With the growing availability of experimental loophole-free Bell tests, it has become possible to implement a new class of device-independent random number generators whose output can be certified to be uniformly random without requiring a detailed model of the quantum devices used. However, all previous experiments require many input bits in order to certify a small number of output bits, and it is an outstanding challenge to develop a system that generates more randomness than is used. Here, we devise a device-independent spot-checking protocol which uses only uniform bits as input. Implemented with a photonic loophole-free Bell test, we can produce 24% more certified output bits (1,181,264,237 bits) than consumed input bits (953,301,640 bits), which is 5 orders of magnitude more efficient than our previous work [Phys. Rev. Lett. 124, 010505 (2020)]. The experiment ran for 91.0 hours, creating randomness at an average rate of 3,606 bits/second with a soundness error bounded by 5.7e-7 in the presence of classical side information. Our system will allow for greater trust in public sources of randomness, such as randomness beacons, and the protocol may one day enable high-quality sources of private randomness as the device footprint shrinks.Presenter live session: Yanbao Zhangsubmission #40
- Experimental quantum key distribution secure against malicious devicesVíctor Zapatero (University of Vigo, Spain); Wei Li (University of Science and Technology of China, Hefei, China); Feihu Xu (University of Science and Technology of China, Hefei, China); Marcos Curty (University of Vigo, Spain)[abstract]Abstract: The fabrication of quantum key distribution (QKD) systems typically involves several parties, thus providing Eve with multiple opportunities to meddle with the devices. As a consequence, conventional hardware and/or software hacking attacks pose natural threats to the security of practical QKD. Fortunately, if the number of corrupted devices is limited, the security can be restored by using redundant apparatuses. Here, we report on the demonstration of a secure QKD setup with optical devices and classical post-processing units possibly controlled by an eavesdropper. We implement a 1.25 GHz chip-based measurement-device-independent QKD system secure against malicious devices on both the measurement and the users' sides. The secret key rate reaches 137 bps over a 24 dB channel loss. Our setup, benefiting from high clock rate, miniaturized transmitters and a cost-effective structure, provides a promising solution for widespread applications requiring uncompromising communication security.Presenter live session: Víctor Zapaterosubmission #36