当前位置: X-MOL 学术Quantum › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Receiver-Device-Independent Quantum Key Distribution
Quantum ( IF 6.4 ) Pub Date : 2022-05-24 , DOI: 10.22331/q-2022-05-24-718
Marie Ioannou 1 , Maria Ana Pereira 1 , Davide Rusca 1 , Fadri Grünenfelder 1 , Alberto Boaron 1 , Matthieu Perrenoud 1 , Alastair A. Abbott 1, 2 , Pavel Sekatski 1 , Jean-Daniel Bancal 1, 3 , Nicolas Maring 1 , Hugo Zbinden 1 , Nicolas Brunner 1
Affiliation  

We present protocols for quantum key distribution in a prepare-and-measure setup with an asymmetric level of trust. While the device of the sender (Alice) is partially characterized, the receiver's (Bob's) device is treated as a black-box. The security of the protocols is based on the assumption that Alice's prepared states have limited overlaps, but no explicit bound on the Hilbert space dimension is required. The protocols are immune to attacks on the receiver's device, such as blinding attacks. The users can establish a secret key while continuously monitoring the correct functioning of their devices through observed statistics. We report a proof-of-principle demonstration, involving mostly off-the-shelf equipment, as well as a high-efficiency superconducting nanowire detector. A positive key rate is demonstrated over a 4.8 km low-loss optical fiber with finite-key analysis. The prospects of implementing these protocols over longer distances is discussed.

中文翻译:

与接收器设备无关的量子密钥分配

我们在具有非对称信任级别的准备和测量设置中提出了量子密钥分配协议。虽然发送者 (Alice) 的设备具有部分特征,但接收者 (Bob) 的设备被视为黑盒。协议的安全性基于 Alice 的准备状态具有有限重叠的假设,但不需要明确限制 Hilbert 空间维度。这些协议不受对接收方设备的攻击,例如致盲攻击。用户可以建立一个秘密密钥,同时通过观察到的统计数据持续监控其设备的正确运行。我们报告了一个原理验证演示,主要涉及现成的设备,以及一个高效的超导纳米线探测器。一个正的关键率被证明超过 4。具有有限键分析的 8 公里低损耗光纤。讨论了在更长距离上实施这些协议的前景。
更新日期:2022-05-24
down
wechat
bug