Device-Independent Quantum Key Distribution

From Quantum Protocol Zoo
Revision as of 22:43, 18 March 2019 by Shraddha (talk | contribs) (Created page with " A device-independent quantum key distribution protocol implements the task of Quantum Key Distribution (QKD) without relying on any particular description of the underlyi...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

A device-independent quantum key distribution protocol implements the task of Quantum Key Distribution (QKD) without relying on any particular description of the underlying system. The protocol enables two parties, Alice and Bob, to establish a classical secret key by distributing an entangled quantum state and checking for the violation of a \underline{Bell inequality} in order to certify the security. The output of the protocol is a classical secret key which is completely unknown to any third party, namely an eavesdropper.

Tags: Two Party, Quantum Enhanced Classical Functionality, Specific Task,Quantum Key Distribution, BB84 QKD,

Assumptions

  • We assume the existence of an authenticated public classical channel between the two parties
  • We assume synchronous network between parties
  • We assume security from coherent attacks

Outline

A DIQKD protocol is composed by the following steps:

  • Distribution: For each round of the distribution phase:
    • Alice uses the source to prepare a maximally entangled state and send half of the state to Bob.
    • Upon receiving the state, Bob announces that he received it, and they both use their respective devices to measure the quantum systems. They record their output in a string of bits.
  • A second phase where Alice and Bob publicly exchange classical information in order to perform error correction, where they correct their strings generating the raw keys, and parameter estimation, where they estimate the parameters of interest. At the end of this phase Alice and Bob are supposed to share the same $n$-bit string and have an estimate of how much knowledge an eavesdropper might have about their raw key.
  • In the final phase, Alice and Bob perform privacy amplification, where the not fully secure -bit strings are mapped into smaller strings and , which represents the final keys of Alice and Bob respectively.

Hardware Requirements

  • Network Stage: Entanglement Distribution
  • Relevant Network Parameters: (see Entanglement Distribution)
  • Distribution of Bell pairs, and measurement in three different bases (two basis on Alice's side and three basis on Bob's side).
  • Minimum number of rounds ranging from to depending on the network parameters, for commonly used secure parameters.
  • , taking a depolarizing model as benchmark. Parameters satisfying are sufficient.
  • Authenticated classical channel.
  • Random number generator.

Notations Used

  • expected number of rounds
  • final key length
  • fraction of test rounds
  • quantum bit error rate
  • CHSH violation
  • expected winning probability on the CHSH game in an honest implementation
  • width of the statistical interval for the Bell test
  • confidence interval for the Bell test
  • smoothing parameter
  • error probabilities of the error correction protocol
  • error probability of Bell violation estimation.
  • error probability of Bell violation estimation.
  • error probability of the privacy amplification protocol
  • leakage in the error correction protocol

Properties

Either Protocol (see Pseudo-code) abort with probability higher than , or it generates a -correct-and-secret key of length
Failed to parse (syntax error): {\displaystyle l\geq& \frac{{n}}{\bar{s}}\eta_{opt} -\frac{{n}}{\bar{s}}h(\omega_{exp}-\delta_{est}) -\sqrt{\frac{{n}}{\bar{s}}}\nu_1 -\mbox{leak}_{EC} }
Failed to parse (unknown function "\de"): {\displaystyle \quad -3\log\de{1-\sqrt{1-\de{\frac{\epsilon_s}{4(\epsilon_{EA} + \epsilon_{EC})}}^2}}+2\log\de{\frac{1}{2\epsilon_{PA}}}}
where is the leakage due to error correction step and the functions , , and are specified in Table below. The security parameters of the error correction protocol, and , mean that if the error correction step in Protocol 1 does not abort, then with probability at least , and for an honest implementation, the error correction protocol aborts with probability at most .

Pseudo Code

  • Input:
  • Output:

Stage 1 Distribution and measurement

  1. For i=1,2,...,n
    1. Sender chooses random bits and such that
    2. Sender prepares and sends it to Bob
    3. Receiver announces receiving a state
    4. Receiver chooses bit such that
    5. Receiver measures in basis with outcome
  • At this stage Sender holds strings and Receiver , all of length

Stage 2 Sifting

  1. Alice and Bob publicly announce
  2. For i=1,2,....,n
    1. If
      1. append</math>(A_i)</math>
      2. append
      3. append
      4. append
  • Now Sender holds strings and Receiver , all of length

Stage 3 Parameter estimation

  1. For
    1. size = 0
    2. If{
      1. Sender and Receiver publicly announce
      2. Sender and Receiver compute , where is the Kronecker delta
    3. size += 1\;
  • Both Sender and Receiver, each, compute

Stage 4 Error correction

  • is an error correction subroutine determined by the previously estimated value of and with error parameters and
  1. Both Sender and Receiver run .
  2. Receiver obtains

Stage 5 Privacy amplification

  • is a privacy amplification subroutine determined by the size , computed from equation for key length (see Properties), and with secrecy parameter
  1. Sender and Receiver run $PA(A_1^{n'},\tilde{B}_1^{n'})$ and obtain secret keys $K_A, K_B$\;

Further Information

  1. BB(1984) introduces the BB84 protocol, as the name says, by Charles Bennett and Gilles Brassard.
  2. TL(2017) The derivation of the key length in Properties, combines the techniques developed in this article and minimum leakage error correcting codes.
  3. GL03 gives an extended analysis of the BB84 in the finite regime.
  4. Sifting: the BB84 protocol can also be described in a symmetric way. This means that the inputs and are chosen with the same probability. In that case only of the generated bits are discarded during the sifting process. Indeed, in the symmetric protocol, Alice and Bob measure in the same basis in about half of the rounds.
  5. LCA05 the asymmetric protocol was introduced to make this more efficient protocol presented in this article.
  6. A post-processing of the key using 2-way classical communication, denoted Advantage distillation, can increase the QBER tolarance up to (3).
  7. We remark that in Pseudo Code, the QBER in the basis is not estimated during the protocol. Instead Alice and Bob make use of a previous estimate for the value of and the error correction step, Step 4 in the pseudo-code, will make sure that this estimation is correct. Indeed, if the real QBER is higher than the estimated value , Pseudo Code will abort in the Step 4 with very high probability.
  8. The BB84 can be equivalently implemented by distributing EPR pairs and Alice and Bob making measurements in the and basis, however this required a entanglement distribution network stage.