arXiv Analytics

Sign in

arXiv:2111.04351 [quant-ph]AbstractReferencesReviewsResources

Receiver-Device-Independent Quantum Key Distribution Protocols

Marie Ioannou, Pavel Sekatski, Alastair A. Abbott, Denis Rosset, Jean-Daniel Bancal, Nicolas Brunner

Published 2021-11-08Version 1

We consider a receiver-device-independent (RDI) approach to quantum key distribution. Specifically, we discuss protocols for a prepare-and-measure scenario and present a detailed security analysis. The sender's (Alice's) device is partially characterized, in the sense that we assume bounds on the overlaps of the prepared quantum states. The receiver's (Bob's) device requires no characterisation and can be represented as a black-box. Our protocols are therefore robust to any attack onBob, such as blinding attacks. In particular, we show that a secret key can be established even when the quantum channel has arbitrarily low transmission by considering RDI protocols exploiting sufficiently many states. Finally, we discuss how the hypothesis of bounded overlaps can be naturally applied to practical devices.

Comments: See also the companion paper where a proof-of-principle experiment is reported arXiv:2104.14574
Journal: New J. Phys. 24 063006, 2022
Categories: quant-ph
Related articles: Most relevant | Search more
arXiv:2012.05157 [quant-ph] (Published 2020-12-09)
Noiseless attack on certain quantum key distribution protocols
arXiv:1704.08169 [quant-ph] (Published 2017-04-26)
Noisy entanglement-assisted classical capacity as a security framework for two-way quantum key distribution protocols
arXiv:2406.09091 [quant-ph] (Published 2024-06-13)
Simulations of distributed-phase-reference quantum key distribution protocols