Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies.
Due to its ability to tolerate high channel loss, decoy-state quantum key distribution (QKD) has been one of the main focuses within the QKD community. Notably, several experimental groups have demonstrated that it is secure and feasible under real-world conditions. Crucially, however, the security and feasibility claims made by most of these experiments were obtained under the assumption that the eavesdropper is restricted to particular types of attacks or that the finite-key effects are neglected. Unfortunately, such assumptions are not possible to guarantee in practice. In this work, we provide concise and tight finite-key security bounds for practical decoy-state QKD that are valid against general attacks.
We present a source of entangled photons that violates a Bell inequality free of the "fair-sampling" assumption, by over 7 standard deviations. This violation is the first reported experiment with photons to close the detection loophole, and we demonstrate enough "efficiency" overhead to eventually perform a fully loophole-free test of local realism. The entanglement quality is verified by maximally violating additional Bell tests, testing the upper limit of quantum correlations. Finally, we use the source to generate "device-independent" private quantum random numbers at rates over 4 orders of magnitude beyond previous experiments.This document has been published at http://prl.aps.org/abstract/PRL/v111/i13/e130406 in Phys. Rev. Lett.PACS numbers: 03.65. Ud, 03.67.Ac, 42.50.Xa, 03.67.Bg In 1935, Einstein, Podolsky, and Rosen suggested that certain quantum mechanical states must violate one or both of the fundamental classical assumptions of locality (sufficiently distant events cannot change the outcome of a nearby measurement) and realism (the outcome probabilities of potential measurements depend only on the state of the system). These nonclassical two-particle states exhibit multiple-basis correlations (or anti-correlations), and are referred to as "entangled". Because locality and realism are so fundamental to classical intuition, a central debate in 20th century physics [1] revolved around the following question: could an alternative to quantum mechanics-a local realistic theory-explain entanglements seemingly nonclassical correlations? In 1964, John Bell devised a way to in principle answer this question experimentally, by analyzing the limit of allowed correlations between measurements made on an ensemble of any classical system [2]. If performed under sufficiently ideal conditions, a violation of Bells inequality would conclusively rule out all possible local realistic theories. Although entanglement has been experimentally demonstrated and the Bell inequality violated in a myriad of non-ideal experiments [3][4][5][6][7][8][9][10][11][12], each of these experiments fails to overcome at least one of two critical obstacles.The first obstacle-the "locality loophole"-addresses the possibility that a local realistic theory might rely on some type of signal sent from one entangled particle to its partner (e.g., a signal containing information about the specific measurement carried out on the first particle), or from the measurement apparatus to the source (known as the freedom of choice loophole). These loopholes have thus far only been closed using entangled photons [8, 13]; photons traveling in different directions can be measured at places and times which are relativistically strictly simultaneous (i.e., in a space-like separated configuration). The second obstacle-the "detection loophole"-addresses the fact that even maximally entangled particles, when measured with low-quantum-efficiency detectors, will produce experimental results that can be explained by a local realistic theory. To avoid this, almos...
Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach-measurement-device-independent quantum key distribution-has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.
Information encoded in high-dimensional quantum states can achieve ultrahigh rates over metropolitan distances.
The generation of random numbers is a task of paramount importance in modern science. A central problem for both classical and quantum randomness generation is to estimate the entropy of the data generated by a given device. Here we present a protocol for self-testing quantum random number generation, in which the user can monitor the entropy in real time. Based on a few general assumptions, our protocol guarantees continuous generation of high quality randomness, without the need for a detailed characterization of the devices. Using a fully optical setup, we implement our protocol and illustrate its self-testing capacity. Our work thus provides a practical approach to quantum randomness generation in a scenario of trusted but error-prone devices.
We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key rates, we implemented a fast hardware key distillation engine which allows for key distillation rates up to 4 Mbps in real time. The system employs wavelength multiplexing in order to run over only a single optical fibre. Using fast gated InGaAs single photon detectors, we reliably distribute secret keys with a rate above 21 kbps over 25 km of optical fibre. We optimized the system considering a security analysis that respects finite-keysize effects, authentication costs and system errors for a security parameter of ε QKD = 4 × 10 −9 .
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.