Device-Independent Quantum Key Distribution: Difference between revisions
Line 63: | Line 63: | ||
*<math>\nu_1=2 \Big(\log 7 +\left\lceil\frac{|h'(\omega_{exp}+\delta_{est})|}{1-(1-\gamma)^{s_{\max}}}\right\rceil\Big)\sqrt{1-2\log\epsilon_s}</math> | *<math>\nu_1=2 \Big(\log 7 +\left\lceil\frac{|h'(\omega_{exp}+\delta_{est})|}{1-(1-\gamma)^{s_{\max}}}\right\rceil\Big)\sqrt{1-2\log\epsilon_s}</math> | ||
== | ==Protocol Description== | ||
*'''Input: '''<math> n, \delta</math></br> | *'''Input: '''<math> n, \delta</math></br> | ||
*'''Output: '''<math> K_A, K_B</math></br> | *'''Output: '''<math> K_A, K_B</math></br> |
Revision as of 11:16, 12 July 2019
This example protocol implements the task of Quantum Key Distribution (QKD) without relying on any particular description of the underlying hardware system. The protocol enables two parties to establish a classical secret key by distributing an entangled quantum state and checking for the violation of a Bell inequality in order to certify the security. The output of the protocol is a classical secret key which is completely unknown to any third party, namely an eavesdropper.
Tags: Two Party, Quantum Enhanced Classical Functionality, Specific Task,Quantum Key Distribution, BB84 QKD,
Assumptions
- Network: we assume the existence of an authenticated public classical channel between Alice and Bob.
- Timing: we assume that the network is synchronous.
- Adversarial model: coherent attacks.
Outline
A DIQKD protocol is composed by the following steps:
- The first phase of the protocol is called distribution. For each round of this phase:
- Alice uses the source to prepare a maximally entangled state and send half of the state to Bob.
- Upon receiving the state, Bob announces that he received it, and they both use their respective devices to measure the quantum systems. They record their output in a string of bits.
- The second phase is when Alice and Bob publicly exchange classical information in order to perform error correction, where they correct their strings generating the raw keys, and parameter estimation, where they estimate the parameters of interest. At the end of this phase Alice and Bob are supposed to share the same -bit string and have an estimate of how much knowledge an eavesdropper might have about their raw key.
- In the final phase, Alice and Bob perform privacy amplification, where the not fully secure -bit strings are mapped into smaller strings and Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle K_B} , which represents the final keys of Alice and Bob respectively.
Requirements
- Network Stage: Entanglement Distribution
- Relevant Network Parameters: transmission error , measurement error (see Entanglement Distribution).
- Benchmark values:
- Minimum number of rounds ranging from Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \mathcal{O}(10^6)} to depending on the network parameters, for commonly used security parameters.
- Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle QBER \leq 0.071} , taking a depolarizing model as benchmark. Parameters satisfying are sufficient to asymptotically get positive secret key rate.
- Distribution of Bell pairs, and measurement in three different bases (two basis on Alice's side and three basis on Bob's side).
- Requires random number generator.
Notation
- Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle n} expected number of rounds
- The total number of rounds is divided in to blocks of size upper-bounded by .
- final key length
- fraction of test rounds
- Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle Q} quantum bit error rate
- CHSH violation
- expected winning probability on the CHSH game in an honest implementation
- Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \delta_{est}} width of the statistical interval for the Bell test
- confidence interval for the Bell test
- smoothing parameter
- error probabilities of the error correction protocol
- Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \epsilon_{EA}} error probability of Bell violation estimation.
- error probability of Bell violation estimation.
- error probability of the privacy amplification protocol
- Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \mbox{leak}_{EC}} leakage in the error correction protocol
- For any registers , we use Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle Z_j^k,\ (j\leq k)} as a shorthand notation for the string Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle Z_j,\ldots,Z_k} .
Properties
Either the protocol (see Pseudocode) aborts with probability higher than , or it generates a
Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle (2\epsilon_{EC}+\epsilon_{PA}+\epsilon_s)}
-correct-and-secret key of length [7]
Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \begin{align} l\geq \frac{{n}}{\bar{s}}\eta_{opt} -\frac{{n}}{\bar{s}}h(\omega_{exp}-\delta_{est}) -\sqrt{\frac{{n}}{\bar{s}}}\nu_1 -\mbox{leak}_{EC} -3\log\Bigg(1-\sqrt{1-\Bigg(\frac{\epsilon_s}{4(\epsilon_{EA} + \epsilon_{EC})}\Bigg)^2}\Bigg)+2\log\Bigg(\frac{1}{2\epsilon_{PA}}\Bigg), \end{align} }
where is the leakage due to error correction step and the functions Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \bar{s}}
, , and are specified below.
The security parameters of the error correction protocol, and , mean that if the error correction step of the protocol (see below) does not abort, then Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle K_A=K_B}
with probability at least , and for an honest implementation, the error correction protocol aborts with probability at most .
- Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \eta_{opt}=\max_{\frac{3}{4}<\frac{{p}_t(1)}{1-(1-\gamma)^{s_{max}}}<\frac{2+\sqrt{2}}{4}} \Bigg(F_{\min}(\vec{p},\vec{p}_t)-\frac{1}{\sqrt{m}}\nu_2\Bigg)}
- Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle F_{\min}(\vec{p},\vec{p}_t) = \frac{d}{d {p}(1)}g(\vec{p}) \Big|_{\vec{p}_t}\cdot {p}(1)+\Bigg( g(\vec{p}_t)- \frac{d}{d{p}(1)}g(\vec{p})|_{\vec{p}_t}\cdot {p}_t(1) \Bigg)}
Protocol Description
- Input:
- Output:
1. Distribution and measurement
- For every block
- Set and .
- While
- Set
- Alice and Bob choose a random bit such that .
- If then Alice and Bob choose inputs .
- Else they choose .
- Alice and Bob use their devices with the respective inputs and record their outputs, and respectively.
- If they set .
At this point Alice holds strings and Bob , all of length .
2. Error Correction
Alice and Bob apply the error correction protocol (see [5]) , communicating script in the process.
- If aborts, they abort the protocol
- Else they obtain raw keys and .
3. Parameter estimation
- Using and , Bob sets
- If and then
- If and then
- If then
- Bob aborts If , i.e., if they do not achieve the expected violation.
For the summation in 3.2 we use the convention that , that is acts as with respect to the addition.
4. Privacy amplification
is a privacy amplification subroutine (see [6])
- Alice and Bob run and obtain secret keys ;
Further Information
- Acín et al. (2007) gives the first security proof of device-independent QKD against collective attacks.
- Vazirani and Vidick (2014) gives the first security proof of device-independent QKD against coherent attacks.
- Arnon-Friedman et al. (2018) & Arnon-Friedman et al. (2019) simplify and tighten security proofs of device-independent QKD against coherent attacks.
- Tan et al. (2019) shows that post-processing of the key using 2-way classical communication, denoted advantage distillation, can increase the QBER tolerance up to .
- Secret-Key Reconciliation by Public Discussion
- Security of Quantum Key Distribution
- Towards a realization of device-independent quantum key distribution