Abstract
An efficient protocol for quantum key distribution is proposed the security of which is entirely device-independent and not even based on the accuracy of quantum physics. A scheme of that type relies on the quantum-physical phenomenon of non-local correlations and on the assumption that no illegitimate information flows within and between Alice’s and Bob’s laboratories. The latter can be enforced via the non-signaling postulate of relativity if all measurements are carried out simultaneously enough.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Because of space limitations, technical proofs are omitted in this extended abstract. The full proofs are given in [1].
Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Hänggi, E., Renner, R., Wolf, S.: Quantum cryptography based solely on Bell’s theorem (2009), arxiv:quant-ph/0911.4171
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. on Information Theory 22(6), 644–654 (1976)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Maurer, U.: A provably-secure strongly-randomized cipher. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 361–373. Springer, Heidelberg (1991)
Dziembowski, S., Maurer, U.: The bare bounded-storage model: The tight bound on the storage requirement for key agreement. IEEE Trans. on Information Theory 54(6), 2790–2792 (2008)
Wyner, A.D.: The wire-tap channel. Bell System Technical J 54(8), 1355–1387 (1975)
Csiszár, I., Körner, J.: Broadcast channels with confidential messages. IEEE Trans. on Information Theory 24(3), 339–348 (1978)
Maurer, U.: Conditionally-perfect secrecy and a provably-secure randomized cipher. J. of Cryptology 5(1), 53–66 (1992)
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Int. Conf. on Computers, Systems and Signal Processing (1984)
Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67(6), 661–663 (1991)
Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73(2), 022320 (2006)
Fung, C.H.F., Qi, B., Tamaki, K., Lo, H.K.: Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A 75(3), 032314 (2007)
Qi, B., Fung, C.H.F., Lo, H.K., Ma, X.: Time-shift attack in practical quantum cryptosystems. Quantum Information and Computation 7, 073–082 (2007)
Zhao, Y., Fung, C.H.F., Qi, B., Chen, C., Lo, H.K.: Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78(4), 042333 (2008)
Makarov, V.: Controlling passively quenched single photon detectors by bright light. New J. of Physics 11(6), 065003 (2009)
Scarani, V., Kurtsiefer, C.: The black paper of quantum cryptography: real implementation problems (2009)
Mayers, D.C., Yao, A.: Quantum cryptography with imperfect apparatus. In: FOCS 1998, pp. 503–509 (1998)
Barrett, J., Hardy, L., Kent, A.: No signalling and quantum key distribution. Phys. Rev. Lett. 95, 010503 (2005)
Acín, A., Massar, S., Pironio, S.: Efficient quantum key distribution secure against no-signalling eavesdroppers. New J. of Phys. 8(8), 126 (2006)
Scarani, V., Gisin, N., Brunner, N., Masanes, L., Pino, S., Acín, A.: Secrecy extraction from no-signalling correlations. Phys. Rev. A 74(4), 042339 (2006)
Acín, A., Gisin, N., Masanes, L.: From Bell’s theorem to secure quantum key distribution. Phys. Rev. Lett. 97, 120405 (2006)
Acín, A., Brunner, N., Gisin, N., Massar, S., Pironio, S., Scarani, V.: Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007)
McKague, M.: Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices. New J. of Phys. 11(10), 103037 (2009)
Terhal, B.M.: Is entanglement monogamous? IBM J. of Research and Development 48(1), 71–78 (2004)
Bell, J.S.: On the Einstein-Podolsky-Rosen paradox. Physics 1, 195–200 (1964)
Einstein, A., Podolsky, B., Rosen, N.: Can quantum-mechanical description of physical reality be considered complete? Phys. Rev. 47, 777–780 (1935)
Clauser, J.F., Horne, M.A., Shimony, A., Holt, R.A.: Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23(15), 880–884 (1969)
Popescu, S., Rohrlich, D.: Quantum nonlocality as an axiom. Found. Phys. 24(3), 379–385 (1994)
Cirel’son, B.S.: Quantum generalizations of Bell’s inequality. Lett. in Math. Phys. 4(2), 93–100 (1980)
Bennett, C.H., Brassard, G., Robert, J.M.: Privacy amplification by public discussion. SIAM J. on Computing 17(2), 210–229 (1988)
Impagliazzo, R., Levin, L.A., Luby, M.: Pseudo-random generation from one-way functions. In: STOC 1989, pp. 12–24 (1989)
Bennett, C.H., Brassard, G., Crépeau, C., Maurer, U.: Generalized privacy amplification. IEEE Trans. on Information Theory 41(6), 1915–1923 (1995)
König, R., Maurer, U., Renner, R.: On the power of quantum memory. IEEE Trans. on Information Theory 51(7), 2391–2401 (2005)
Renner, R., Koenig, R.: Universally composable privacy amplification against quantum adversaries. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 407–425. Springer, Heidelberg (2005)
Hänggi, E., Renner, R., Wolf, S.: The impossibility of non-signaling privacy amplification (2008)
Masanes, L.: Universally composable privacy amplification from causality constraints. Phys. Rev. Lett. 102(14), 140501 (2009)
Masanes, L., Renner, R., Winter, A., Barrett, J., Christandl, M.: Security of key distribution from causality constraints (2009)
Maurer, U.: Indistinguishability of random systems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 110–132. Springer, Heidelberg (2002)
Pfitzmann, B., Waidner, M.: A model for asynchronous reactive systems and its application to secure message transmission. In: SP 2001, p. 184 (2001)
Backes, M., Pfitzmann, B., Waidner, M.: A composable cryptographic library with nested operations. In: CCS 2003, pp. 220–230 (2003)
Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: FOCS 2001, p. 136 (2001)
Boyd, S., Vandenberghe, L.: Convex optimization. Cambridge University Press, Cambridge (2004)
Carter, J.L., Wegman, M.N.: Universal classes of hash functions (extended abstract). In: STOC 1977, pp. 106–112 (1977)
Brassard, G., Salvail, L.: Secret-key reconciliation by public discussion. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 410–423. Springer, Heidelberg (1994)
König, R., Renner, R.: A de Finetti representation for finite symmetric quantum states. J. Math. Phys. 46(122108) (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hänggi, E., Renner, R., Wolf, S. (2010). Efficient Device-Independent Quantum Key Distribution. In: Gilbert, H. (eds) Advances in Cryptology – EUROCRYPT 2010. EUROCRYPT 2010. Lecture Notes in Computer Science, vol 6110. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13190-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-13190-5_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13189-9
Online ISBN: 978-3-642-13190-5
eBook Packages: Computer ScienceComputer Science (R0)