Receiver-device-independent quantum key distribution protocols

We discuss quantum key distribution protocols and their security analysis, considering a receiver-device-independent (RDI) model. The sender’s (Alice’s) device is partially characterized, in the sense that we assume bounds on the overlaps of the prepared quantum states. The receiver’s (Bob’s) device...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:New journal of physics 2022-06, Vol.24 (6), p.63006
Hauptverfasser: Ioannou, Marie, Sekatski, Pavel, Abbott, Alastair A, Rosset, Denis, Bancal, Jean-Daniel, Brunner, Nicolas
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:We discuss quantum key distribution protocols and their security analysis, considering a receiver-device-independent (RDI) model. The sender’s (Alice’s) device is partially characterized, in the sense that we assume bounds on the overlaps of the prepared quantum states. The receiver’s (Bob’s) device requires no characterisation and can be represented as a black-box. Our protocols are therefore robust to any attack on Bob, such as blinding attacks. In particular, we show that a secret key can be established even when the quantum channel has arbitrarily low transmission by considering RDI protocols exploiting sufficiently many states. Finally, we discuss how the hypothesis of bounded overlaps can be naturally applied to practical devices.
ISSN:1367-2630
1367-2630
DOI:10.1088/1367-2630/ac71bc