Abstract
Device-independent quantum key distribution (DIQKD) is the art of using untrusted devices to distribute secret keys in an insecure network. It thus represents the ultimate form of cryptography, offering not only information-theoretic security against channel attacks, but also against attacks exploiting implementation loopholes. In recent years, much progress has been made towards realising the first DIQKD experiments, but current proposals are just out of reach of today’s loophole-free Bell experiments. Here, we significantly narrow the gap between the theory and practice of DIQKD with a simple variant of the original protocol based on the celebrated Clauser-Horne-Shimony-Holt (CHSH) Bell inequality. By using two randomly chosen key generating bases instead of one, we show that our protocol significantly improves over the original DIQKD protocol, enabling positive keys in the high noise regime for the first time. We also compute the finite-key security of the protocol for general attacks, showing that approximately 108–1010 measurement rounds are needed to achieve positive rates using state-of-the-art experimental parameters. Our proposed DIQKD protocol thus represents a highly promising path towards the first realisation of DIQKD in practice.
Subject terms: Quantum information, Theoretical physics
Device-independent quantum key distribution aims at the ultimate quantum-based unconditional security, but current protocols’ rates are quite far from anything practical. The authors’ protocol narrows this gap by using two randomly chosen key generating bases instead of one.
Introduction
The basic task of DIQKD1–5 is to distribute a pair of identical secret keys between two users, called Alice and Bob, who are embedded in an untrusted network. To help them in their task, Alice and Bob are each given a measurement device, which they use to perform random measurements on a sequence of entangled systems provided by an adversary called Eve (see Fig. 1). The main advantage of DIQKD is that the measurement devices need not be characterised—Alice and Bob only need to verify that the input–output statistics of the devices violate a CHSH Bell inequality6,7. As such, DIQKD represents the pinnacle of cryptography in terms of the number of assumptions required. More specifically, it only asks that (1) the users each hold a trusted source of local randomness, (2) their laboratories are well isolated, (3) they use trusted algorithms for processing their measurement data, (4) if the devices are reused for multiple instances of the protocol, the outputs in later instances do not leak information about earlier outputs, (5) they possess sufficient pre-shared keys to implement information-theoretically secure authenticated (public) channels, and that (6) quantum theory is correct. Given these basic assumptions (which are, in fact, standard assumptions in cryptography), one can then show that DIQKD is information-theoretically secure8–10. We note that assumption (4) is needed to address issues with protocol composition11 and memory attacks12, because information-theoretic security may be violated if the protocol’s public communication leaks some information about the private data from earlier instances.
The practical implementation of DIQKD, however, remains a major scientific challenge. This is mainly due to the need to have extremely good channel parameters (i.e. high Bell violation and low bit error rate), which in practice requires ultra-low-noise setups with very high detection efficiencies; though in recent years the gap between the theory and practice has been significantly reduced owing to more powerful proof techniques 9,10,13 and the demonstrations of loophole-free Bell experiments14–17. The present gap is best illustrated by Murta et al.18, whose feasibility study showed that current loophole-free Bell experiments are just short of generating positive key rates assuming the original DIQKD protocol2,3 (see the dashed line in Fig. 3).
To improve the robustness of DIQKD, researchers have taken several approaches, from heralding-type solutions19–21, local precertification22,23, local Bell tests24, to two-way classical protocols25. However, none of these proposals are truly practical, for they are either more complex in implementation or provide only very little improvements in the channel parameters. Here, we show that a simple variant of the original DIQKD protocol is enough to obtain significant improvements in the channel parameters.
Results and discussion
To start with, we note that in the original protocol introduced by Acín et al.3, the key generating basis is predetermined and known to Eve. For concreteness, let Alice’s and Bob’s measurement settings be denoted by X ∈ {0, 1} and Y ∈ {0, 1, 2}, respectively, and let the corresponding outcomes be denoted by AX ∈ {0, 1} and BY ∈ {0, 1}. The secret key is derived from the events in which Alice and Bob choose X = 0 and Y = 0, respectively. The remaining measurement combinations are then used for determining the CHSH violation. Our DIQKD proposal is essentially the same as the original protocol, except that we introduce an additional measurement setting for Bob and now generate the secret key from both of Alice’s measurements. This additional setting is needed so that Bob has a measurement that is aligned with Alice’s additional key generating basis to obtain correlated outcomes (like in the case of the original protocol). Hence in our proposal, the key generation events are those where Alice and Bob choose X = Y = 0 and X = Y = 1. Below, we describe the proposal in detail (Box 1).
In the parameter estimation step of the protocol, note that when the inputs are not uniformly distributed i.e. p ≠ 1/2, the CHSH value is to be computed in terms of the conditional probabilities P(AX, BY∣X, Y) rather than the unconditioned probabilities P(AX, BY, X, Y) directly. We remark that this does not introduce a measurement-dependence26 security loophole, because the choice of inputs is still independent of the state.
It is well known that incompatible measurements are necessary for the violation of a Bell inequality and that such measurements are not jointly measurable and hence cannot admit a joint distribution27–29. The intuition behind our proposal roughly follows along this line and exploits two related facts: (1) the key generation measurements of Alice must be incompatible for S > 2 and (2) Eve has to guess the secret key from two randomly chosen incompatible measurements.
When the secret key is only generated from a single measurement, like in the original DIQKD protocol, Eve’s attacks are basically limited only by the observed CHSH violation and thus the monogamy of entanglement30. Eve, however, knows which measurement is used for key generation and hence can optimise her attack accordingly. On the other hand, if the secret key is generated from a random choice of two possible measurements, Eve faces an additional difficulty. Namely, in order to achieve a CHSH violation, the two measurements cannot be the same, and it is known2 that for CHSH-based protocols, different measurements can give Eve different amounts of side-information; note that this is not the case for BB84 and six-state QKD protocols. Therefore, at least one of the measurements will not be the one that maximises Eve’s side-information, giving an advantage over protocols based only on one key-generating measurement (Eve cannot tailor her attack to the measurement in each round individually, since she does not know beforehand which measurement will be chosen).
In the following, we first quantify the security of the protocol using the asymptotic secret key rate, K∞. This quantity is the ratio of the extractable secret key length to the total number of measurement rounds N, where N → ∞. In the asymptotic limit, we may also take q → 1, which maximises the so-called sifting factor31 and get
1 |
where ps: = p2 + (1 − p)2 is the probability of having matching key bases, and r∞ is the secret fraction32. The latter is given in terms of entropic quantities and reads
2 |
where is the binary entropy function, λ: = p2/ps, is the quantum bit error rate (QBER) for X, Y, and E is Eve’s quantum side-information gathered just before the error correction step. Here, Z = AΘ and Θ ∈ {0, 1} is the random variable denoting Alice’s basis choice conditioned on the event either X = Y = 0 or X = Y = 1. Moreover, E refers to quantum side information possessed by Eve. Hence, Eve’s knowledge is fully described by EΘ. The second line in equation (2) is the amount of information leaked to Eve during the error correction step (decoding with side-information Θ).
The main challenge here is to put a reliable lower bound on the conditional von Neumann entropy H(Z∣EΘ), which measures the amount of uncertainty Eve has about Z given side-information EΘ, using solely the observed CHSH violation, S. To this end, we employ a family of device-independent entropic uncertainty relations33,34, which we can solve efficiently and reliably using a short sequence of numerical computations. More specifically, we seek to establish weighted entropic inequalities of the form
3 |
where C*(S) is a function of the observed CHSH violation, S. A proof sketch is outlined in the ‘Methods’ section and the complete analysis is provided in the accompanied Supplementary Note 1.
A commonly used noise model for benchmarking the security performance of different QKD protocols is the depolarising channel model2,3,32. In this noise model, all QBERs are the same and related to the CHSH value S via
4 |
Using this model, we compute the secret key rate and H(Z∣EΘ), which are presented in Fig. 2. Here, λ is a free parameter (i.e. a protocol parameter) that can be optimised by Alice and Bob (i.e. they optimise p = P(X = 0)) for a given pair of (S, Q). The result of this optimisation is remarkably simple: it is optimal to use a protocol with λ = 1/2 (uniformly random key generation bases) if S ⪅ 2.5(high noise) and set λ = 1, i.e. a fixed key generation basis otherwise (low noise). Surprisingly, there is no need to consider the intermediate values of 1/2 < λ < 1. In the case of the latter, our proposal reverts back to that of Acín et al.1–3 and the computed secret key rate appears to exactly match their analytical key rate bound. When using H(Z∣EΘ) as a performance metric (which only depends on S and thus applies to a general class of channel models satisfying this constraint), we observe that the uncertainty of Eve for our proposal is always higher than that of the original protocol for all , see the right side of Fig. 2. In fact, for our proposal is nearly optimal, in the sense that the bound on H(Z∣EΘ) is very close to the linear bound, which is the fundamental upper limit of Eve’s uncertainty given a fixed S. However, while it is optimal in this sense, choosing is not always optimal in terms of producing the highest secret key rates, because the key rate is penalized by the sifting factor. Hence, λ = 1 is preferred for the region S ⪆ 2.5.
In order to evaluate the feasibility of our proposal, we look at the existing list of loophole-free CHSH experiments18 and compute the corresponding secret key rates. Generally speaking, there are two types of Bell experiments: one based on measuring entangled photon pairs using high efficiency single-photon detectors, and the other based on event-ready systems35 using entanglement swapping between entangled photon pairs and atoms/NV-centres. Following along the lines of Murta et al.18, we prepare a feasibility region plot for the list of CHSH experiment therein, which is presented in Fig. 3. The immediate observation is that our DIQKD proposal significantly expands the region of channel parameters that give rise to positive key rates, thus substantially improving the robustness of DIQKD. The next observation is that event-ready loophole-free CHSH experiments14,17 are now well within the positive key region; as opposed to the original protocol where they are either in the insecure region or around the boundary. Unfortunately, CHSH experiments based on entangled photon pairs are still in the insecure region (also see Supplementary Note 2), although it should be mentioned that this observation holds only for our proposal and the original DIQKD protocol (Table 1).
Table 1.
Label | Experiment | Year | Rate [bit/channel use] |
---|---|---|---|
(1) | Matsukevich et al.64 | Cold atom 2008 | 0.004 |
(2) | Pironio et al.65 | Cold atom 2010 | 0.118 |
(3) | Giustina et al.66 | Photonic 2013 | 0 |
(4) | Christensen et al.67 | Photonic 2013 | 0 |
(5) | Giustina et al.15 | Photonic 2015 | 0 |
(6) | Shalm et al.16 | Photonic 2015 | 0 |
(7) | Hensen et al.14 | NV-centre 2015 | 0.057 |
(8) | Rosenfeld et al.17 | Cold atom 2017 | 0.019 |
(9) | Liu et al.68 | Photonic 2018 | 0 |
(10) | Liu et al.69 | Photonic 2019 | 0 |
(11) | Li et al.70 | Photonic 2019 | 0 |
Non-photonic experiments ((1, 2) and (7, 8)) now promise a positive keyrate. However, note that the experiments (1, 2) were performed in a single lab and therefore did not close the locality loophole. The photonic experiments (3, 4) also did not close the locality loophole. The more recent experiments (5, 6, 7, 8, 9, 10, 11) closed both locality and detection loopholes. Note that the value of QBER for experiment (8) provided by Murta et al.18 is based on the experiment of Henkel et al.63 while the QBER achievable by experiment (8) is estimated to be higher by the authors of experiment (8)17.
Our results hence show that positive asymptotic key rates can be achieved by recent event-ready loophole-free experiments. This significantly improves over the original protocol2, which does not achieve positive key rates for any such experiments, even in the asymptotic limit (though Murta et al.18 describes prospective future improvements to NV-centre implementations, which may allow positive asymptotic rates). However, there are still a few experimental challenges. For one, we note that the event-ready CHSH experiments are fairly slow compared to their photonic counterparts; e.g. the event-ready experiment by Hensen et al.14 performed only 245 rounds of measurement during a total collection time of 220 h. Recently, Humphreys et al.36 demonstrated that it is possible to improve the entanglement rate by a couple of orders of magnitude, but this comes at the expense of the overall state fidelity and hence lower CHSH violations. While our protocol can yield positive asymptotic key rates in these noise regimes, a relevant question to consider is the number of rounds required to achieve security in a finite-key analysis.
To make this concrete, we analyse the finite-key security of our protocol using the proof technique from a recent work37 (see Supplementary Note 4 for the proof sketch). In particular, we compute the finite-key rates for both collective and general attacks, with the analysis of the latter making use of the entropy accumulation theorem38–40, which essentially certifies the same asymptotic rates as in the collective attacks scenario. (An alternative approach may be the quantum probability estimation technique41.) Our results are summarised in Fig. 3, focusing on the experiments from Hensen et al.14 and Rosenfeld et al.17 (which can achieve positive asymptotic key rate, as mentioned above). We see from the plots that they require ~108 and 1010 measurement rounds, respectively to achieve positive finite-size key rates against general attacks. In these experimental implementations, this number of rounds is still currently out of reach (assuming realistic measurement time). Overall, however, given future improvements on these experimental parameters, our protocol would attain higher asymptotic rates than the original protocol2, and hence also require fewer rounds to achieve positive finite-key rates.
To further improve the robustness and key rates, there are a few possible directions to take. For one, we can consider the full input–output probability distribution instead of just taking the CHSH violation. Since the latter only uses part of the available information, more secrecy could potentially be certified by finding methods to compute secret key rates that take into account the full probability distribution estimated from the experiment. Such a method for general Bell scenarios was recently developed42; however, we found (see Supplementary Note 1) that the bounds it gives in this case are not tight, and are slightly worse than the results presented above. Another possible approach specialized for 2-input 2-output scenarios is presented in Tan et al.37, which is potentially more promising for such scenarios.
Box 1 Proposed device-independent quantum key distribution protocol.
1. Measurements: This step is carried out in N rounds, where N is assumed to be asymptotically large. In each measurement round, Alice’s and Bob’s inputs, denoted by X ∈ {0, 1} and Y ∈ {0, 1, 2, 3}, respectively, are drawn according to the following probability distributions: P(X = 0) = p, P(X = 1) = 1 − p, P(Y = 0) = qp, P(Y = 1) = q(1 − p) and P(Y = 2) = P(Y = 3) = (1 − q)/2, where 0 ≤ p, q ≤ 1. Once Alice and Bob enter their inputs into their respective devices, they each obtain a measurement outcome, which we denote by AX ∈ {0, 1} and BY ∈ {0, 1}, respectively.
2. Sifting: Alice and Bob announce their measurement inputs over an authenticated public channel. This allows them to identify two common subsets of their measurement data: a pair of raw keys32 of size ~ q(p2 + (1 − p)2)N (corresponding to Y ∈ {0, 1} and X = Y) and a pair of parameter estimation data of size ~ (1 − q)N (corresponding to Y ∈ {2, 3}). Alice and Bob discard the remaining measurement data.
3. Parameter estimation: Alice and Bob publicly reveal their measurement outcomes from the parameter estimation data set and compute the underlying CHSH value:
where CXY = P(AX = BY∣X, Y) − P(AX ≠ BY∣X, Y) is the correlation function of X, Y. Alice and Bob proceed to the next step if S > Stol, where Stol is a predefined threshold value. Otherwise, they abort the protocol.
4. One-way error correction and verification: In the first part, Alice computes a syndrome based on her raw key (denoted by L) and sends it to Bob via the public channel, who then uses the syndrome and his raw key to recover Alice’s key. In the second part, they perform an error verification by comparing the hash values of their raw keys. Alice and Bob proceed to privacy amplification if the hash values are identical, otherwise they abort the protocol.
5. Privacy amplification: Alice and Bob perform privacy amplification to remove Eve’s information about Alice’s raw key. Once this is completed, Alice and Bob are left with a pair of identical secret keys.
Methods
Here, we outline the main ideas of our security analysis. The core of the security analysis is a reliable lower-bound estimate on the conditional von Neumann entropy of Eve. The complete analysis is deferred to the accompanying Supplementary Note 1.
Average secret key rate
Conditioned on the key generation rounds, Alice and Bob would pick their inputs (basis choices) according to a probability distribution (p, 1 − p). As discussed in the main text, this distribution acts as a free parameter in our protocol and has to be adapted to a given set of channel parameters (S, Q) in order to obtain an optimal performance. In the following we will, therefore, outline how the final key rate K∞ and secret fraction r∞ are given as functions of (p, S, Q).
The secret fraction in a round of the protocol, in which the measurements AX and BY are obtained, can be computed using the Devetak-Winter bound 43 under the assumption of collective attacks,
5 |
Here the term H(AX∣BY) only depends on the statistics of the measured data of Alice and Bob, and can therefore be directly estimated in an experiment. For binary measurements this quantity can be furthermore expressed by the respective bit error rate via
6 |
In our protocol, a key generation round is obtained whenever Alice and Bob perform measurements AX and BY with X = Y. The probability that Alice and Bob perform the measurements A0 and B0 is p2 and the probability that they perform A1 and B1 is (1−p)2. When the error correction is done for both cases, (A0, B0) or (A1, B1), separately, we obtain the overall asymptotic key rate as sum of the individual secret fractions weighted by their respective probability. This gives
7 |
where the success probability ps and the relative distribution of the basis choices (λ, (1 − λ)) are given by
8 |
and
9 |
respectively. As mentioned in the main text we also write
10 |
where Θ denotes a binary random variable (distributed by (λ, (1 − λ))) that (virtually) determines which basis pair, (A0, B0) or (A1, B1), is picked in a successful key generation round in order to generate the values of a combined random variable Z = AΘ.
Device-independent entropic uncertainty relation
The only term in the key rate formula (7) that cannot be directly obtained from the measurement data is the conditional entropy H(Z∣EΘ). The main challenge here is thus to establish a reliable lower bound on this quantity assuming only the CHSH violation S. More specifically, we are interested in finding a function C*(S) such that
11 |
holds for all possible combinations of states and measurements (in any dimension) that are consistent with the observed CHSH value S. An inequality like equation (11) is commonly referred to as an entropic uncertainty relation, and in our case we are interested in relations with quantum side-information33,44,45. There is a vast amount of literature34,46,47 in which relations of this form33,44,45,48 or similar49–55 have been studied and several types of uncertainty relations have been discovered. A typical family of entropic uncertainty relations, which is close to our problem, is that proposed by Berta et al.33 and the weighted generalisation of it from Gao et al.45. These inequalities, however, are not device-independent and require the measurement characterisation of at least one party, which unfortunately is not possible in our setting.
To the best of our knowledge, the only known entropic uncertainty relations for uncharacterised measurements are given by Tomamichel et al.56 and Lim et al.24. There, the uncertainty of the measurement outcomes with side-information is lower bounded by the so-called overlap of the measurements33, which in turn is further bounded by a function of the CHSH violation. Although these relations are applicable to uncharacterised measurements, they appear fairly weak when applied to our DIQKD proposal, i.e. they do not provide any improvement in the secret key rate when compared to the original protocol.
The lower bound we establish in this work, i.e. the function C*(S), appears to be optimal in that it can be saturated by two-qubit states up to numerical precision (see Supplementary Note 1). C*(S) is depicted in Fig. 2b for λ = 0.5, and in Fig. 4b for continuous values of λ and . In Fig. 4a, we additionally plot the so-called uncertainty sets47,54,57 of our relation. These are sets that outline all the admissible pairs of entropies (H(A0∣E), H(A1∣E)) for a given lower bound on S. We also note that it may seem plausible to independently optimise each term H(A0∣E), H(A1∣E), instead of the sum of them. However, as shown in Fig. 4b, numerical results suggest that optimising the weighted sum of these terms is always better than optimising the individual terms: this also highlights where our DIQKD proposal improves over the original protocol.
Computing C*(S)
As mentioned, the complete analysis of our lower bound on C*(S) is deferred to Supplementary Note 1. In the following, we will only outline the main steps of the analysis to reduce the computation of C*(S) to a sequence of problems that can be treated successively. The basic idea to find a way to compute C*(S) by only using known estimates (both analytical and numerical) that give a final lower bound that is reliable. This means that all the steps of the analysis assume the worst-case scenario, so that the final value is a strict lower bound on C*(S). In brief, the analysis uses a refined version of Pinsker’s inequality, semi-definite optimisation and an ε-net to achieve this goal.
Our first step is to reformulate the tripartite problem involving Alice, Bob and Eve to a bipartite one that involves only Alice and Bob. Following Tan et al.42, we note that conditional entropy terms like H(A0∣E) can always be reformulated as the entropy production H(TX(ρAB)) − H(ρAB) of the quantum channel TX on the post measurement state on the Alice-Bob system, which is defined as the change of von Neumann entropy of the system that is subjected to the quantum channel TX. In our case, this channel TX is a pinching channel, defined as:
12 |
where denotes the projector associated with Alice’s measurement setting x and outcome a. Clearly, the pinching channel satisfies and acts complementary to the map that models Alice’s measurement. With this, we can further rewrite the entropy production as
13 |
where D(ρ∣∣σ) is the quantum relative entropy of ρ with respect to σ.
Then, we follow a proof technique in the original work on DIQKD2,3 to reduce the underlying ρAB to a mixture of two-qubit states, where it is assumed that the mixing is due to Eve. That is, since each party (Alice and Bob) performs only two binary measurements, their local measurement devices can be described by only specifying two projectors (whose dimensions are unspecified). The corresponding local algebras, which are generated by two projectors, are well investigated mathematical objects58 for which a central theorem59 states that their representation can be decomposed into 2 × 2 (qubit) blocks and a commuting rest. Correspondingly, this allows us to conclude (details in the Supplementary Note 1) that the desired uncertainty bound can be decomposed accordingly as a convex combination:
14 |
where is a lower bound on the conditional entropy H(Z∣EΘ) for projective measurements on two qubits. Here, we note that once a bound on is established, the optimisation overall measures μ, which can be geometrically interpreted as taking a convex hull, is straightforward to perform. As shown in Fig. 5, the situation for the optimisation corresponding to can now, w.l.o.g., be fully described by specifying a two-qubit state and two angles (φ, ω) that describe the relative alignment of Alice’s and Bob’s measurements.
Although the problem has been reduced to two-qubit states and projective qubit measurements, a direct computation of is still an open problem as there are no known proof techniques that can be applied to our situation. To that end, we employ a refined version of Pinsker’s inequality (see Theorem 1 in the Supplementary Note 3),
15 |
to obtain a lower bound on the relative entropy in (13) in terms of the trace norm.
The big advantage of establishing estimates in terms of the trace norm is that a minimisation thereof can be formulated as a semi-definite program (SDP). (In fact, it is possible in principle to use this inequality to bound the entropy without reducing the analysis to qubits, though the resulting bounds in that case do not appear to be very tight. We discuss this in detail in Supplementary Note 1.)
With that, the overall optimisation problem at hand now reads
16 |
where
17 |
and constraints that are linear in ρ given by 4 × 4-matrices
18 |
where Q(φ), Fx(φ) and Fy(φ) depend on φ in terms of the first and second order in and . In the above expression, b is a vector on a (2-norm) unit sphere that arises from reformulating the description of Bob’s measurements.
This optimisation can be solved in three stages, indicated by boxes in (16):
-
(i)
The optimisation within the square bracket [ ] over ρ is an SDP on 4 × 4 matrices, which can be efficiently solved60.
-
(ii)
The optimisation in the curly bracket { } over b is performed by relaxing the continuous optimisation over the (2-norm) unit sphere to a discrete optimisation on a sequence of polygonial approximation (similar to the method used in Schwonnek et al.61,62). Also this optimisation can be performed with reliable lower bounds to the order of any target precision.
-
(iii)
The last optimisation runs over the single parameter φ coming from a bounded domain. Hence, it is possible to efficiently tackle this optimisation by an ε-net. In order to do so it is required to provide an error estimate (for the magenta and the black box) for all φ that are located in an ε-interval around some φ0. Note that all previous optimisations are linear in ρ and b and only depend in the second order on and (which are bounded functions of φ).
Supplementary information
Acknowledgements
R.S., K.T.G., and C.C.-W. L. were funded by the National Research Foundation of Singapore, under its NRF Fellowship grant (NRFF11-2019-0001) and NRF Quantum Engineering Programme grant (QEP-P2), and the Centre for Quantum Technologies. V.S. and I.W.P. were supported by NRF and the Ministry of Education, Singapore, under the Research Centres of Excellence program. E.Y.-Z.T. was funded by the Swiss National Science Foundation via the National Center for Competence in Research for Quantum Science and Technology (QSIT), the Air Force Office of Scientific Research (AFOSR) via grant FA9550-19-1-0202, and the QuantERA project eDICT. R.W. was supported, in part, by the DFG through SFB 1227 (DQmat), the RTG 1991, and funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany’s Excellence Strategy EXC-2123 QuantumFrontiers 390837967.
Author contributions
C.C.-W. L., V.S. and K.T.G. invented the proposed DIQKD protocol. All authors contributed to the security analysis of the protocol with key steps of the analysis provided by R.S. and E.Y.-Z.T. The numerical analysis for the all-photonics setup was performed by I.W.P. while R.W. contributed to the derivation of Theorem 1. All authors contributed to the writing of the manuscript. C.C.-W.L. supervised the project.
Data availability
Data sharing is not applicable to this paper as no datasets were generated or analysed during the current study.
Code availability
The code supporting the plots within this paper is available from the corresponding author upon reasonable request.
Competing interests
The authors declare no competing interests.
Footnotes
Peer review information Nature Communications thanks Matty Hoban and the other anonymous reviewer(s) for their contribution to the peer review of this work.
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
These authors contributed equally: René Schwonnek, Koon Tong Goh.
Supplementary information
The online version contains supplementary material available at 10.1038/s41467-021-23147-3.
References
- 1.Mayers, D. & Yao, A. Quantum cryptography with imperfect apparatus. In Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No. 98CB36280), 503–509 (IEEE, 1998).
- 2.Pironio S, et al. Device-independent quantum key distribution secure against collective attacks. New J. Phys. 2009;11:045021. doi: 10.1088/1367-2630/11/4/045021. [DOI] [Google Scholar]
- 3.Acín A, et al. Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 2007;98:230501. doi: 10.1103/PhysRevLett.98.230501. [DOI] [PubMed] [Google Scholar]
- 4.Barrett J, Hardy L, Kent A. No signaling and quantum key distribution. Phys. Rev. Lett. 2005;95:010503. doi: 10.1103/PhysRevLett.95.010503. [DOI] [PubMed] [Google Scholar]
- 5.Reichardt BW, Unger F, Vazirani U. Classical command of quantum systems. Nature. 2013;496:456–460. doi: 10.1038/nature12035. [DOI] [PubMed] [Google Scholar]
- 6.Clauser JF, Horne MA, Shimony A, Holt RA. Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 1969;23:880. doi: 10.1103/PhysRevLett.23.880. [DOI] [Google Scholar]
- 7.Bell JS. On the Einstein-Podolsky-Rosen paradox. Physics. 1964;1:195–200. doi: 10.1103/PhysicsPhysiqueFizika.1.195. [DOI] [Google Scholar]
- 8.Miller CA, Shi Y. Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices. J. ACM. 2016;63:1–63. doi: 10.1145/2885493. [DOI] [Google Scholar]
- 9.Vazirani U, Vidick T. Fully device independent quantum key distribution. Commun. ACM. 2019;62:133–133. doi: 10.1145/3310974. [DOI] [PubMed] [Google Scholar]
- 10.Arnon-Friedman R, Renner R, Vidick T. Simple and tight device-independent security proofs. SIAM J. Comput. 2019;48:181–225. doi: 10.1137/18M1174726. [DOI] [Google Scholar]
- 11.Portmann, C. & Renner, R. Security in Quantum Cryptography. arXiv:2102.00021 [quant-ph]. Preprint at https://arxiv.org/abs/2102.00021v1 (2021).
- 12.Barrett J, Colbeck R, Kent A. Memory attacks on device-independent quantum cryptography. Phys. Rev. Lett. 2013;110:010503. doi: 10.1103/PhysRevLett.110.010503. [DOI] [PubMed] [Google Scholar]
- 13.Vazirani, U. & Vidick, T. Robust device independent quantum key distribution. In Proceedings of the 5th conference on Innovations in theoretical computer science, 35–36 (2014).
- 14.Hensen B, et al. Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres. Nature. 2015;526:682–686. doi: 10.1038/nature15759. [DOI] [PubMed] [Google Scholar]
- 15.Giustina M, et al. Significant-loophole-free test of Bell’s theorem with entangled photons. Phys. Rev. Lett. 2015;115:250401. doi: 10.1103/PhysRevLett.115.250401. [DOI] [PubMed] [Google Scholar]
- 16.Shalm LK, et al. Strong loophole-free test of local realism. Phys. Rev. Lett. 2015;115:250402. doi: 10.1103/PhysRevLett.115.250402. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 17.Rosenfeld W, et al. Event-ready Bell test using entangled atoms simultaneously closing detection and locality loopholes. Phys. Rev. Lett. 2017;119:010402. doi: 10.1103/PhysRevLett.119.010402. [DOI] [PubMed] [Google Scholar]
- 18.Murta G, van Dam SB, Ribeiro J, Hanson R, Wehner S. Towards a realization of device-independent quantum key distribution. Quantum Sci. Technol. 2019;4:035011. doi: 10.1088/2058-9565/ab2819. [DOI] [Google Scholar]
- 19.Gisin N, Pironio S, Sangouard N. Proposal for implementing device-independent quantum key distribution based on a heralded qubit amplifier. Phys. Rev. Lett. 2010;105:070501. doi: 10.1103/PhysRevLett.105.070501. [DOI] [PubMed] [Google Scholar]
- 20.Curty M, Moroder T. Heralded-qubit amplifiers for practical device-independent quantum key distribution. Phys. Rev. A. 2011;84:010304. doi: 10.1103/PhysRevA.84.010304. [DOI] [Google Scholar]
- 21.Kołodyński J, et al. Device-independent quantum key distribution with single-photon sources. Quantum. 2020;4:260. doi: 10.22331/q-2020-04-30-260. [DOI] [Google Scholar]
- 22.Cabello A, Sciarrino F. Loophole-free bell test based on local precertification of photon’s presence. Phys. Rev. X. 2012;2:021010. [Google Scholar]
- 23.Meyer-Scott E, et al. Certifying the presence of a photonic qubit by splitting it in two. Phys. Rev. Lett. 2016;116:070501. doi: 10.1103/PhysRevLett.116.070501. [DOI] [PubMed] [Google Scholar]
- 24.Lim CC-W, Portmann C, Tomamichel M, Renner R, Gisin N. Device-independent quantum key distribution with local bell test. Phys. Rev. X. 2013;3:031006. [Google Scholar]
- 25.Tan EY-Z, Lim CC-W, Renner R. Advantage distillation for device-independent quantum key distribution. Phys. Rev. Lett. 2020;124:020502. doi: 10.1103/PhysRevLett.124.020502. [DOI] [PubMed] [Google Scholar]
- 26.Hall MJW. Relaxed Bell inequalities and Kochen-Specker theorems. Phys. Rev. A. 2011;84:022102. doi: 10.1103/PhysRevA.84.022102. [DOI] [Google Scholar]
- 27.Fine A. Joint distributions, quantum correlations, and commuting observables. J. Math. Phys. 1982;23:1306–1310. doi: 10.1063/1.525514. [DOI] [Google Scholar]
- 28.Busch P. Indeterminacy relations and simultaneous measurements in quantum theory. Int. J. Theor. Phys. 1985;24:63–92. doi: 10.1007/BF00670074. [DOI] [Google Scholar]
- 29.Wolf MM, Perez-Garcia D, Fernandez C. Measurements incompatible in quantum theory cannot be measured jointly in any other no-signaling theory. Phys. Rev. Lett. 2009;103:230402. doi: 10.1103/PhysRevLett.103.230402. [DOI] [PubMed] [Google Scholar]
- 30.Horodecki R, Horodecki P, Horodecki M, Horodecki K. Quantum entanglement. Rev. Mod. Phys. 2009;81:865–942. doi: 10.1103/RevModPhys.81.865. [DOI] [Google Scholar]
- 31.Lo H-K, Chau HF, Ardehali M. Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 2005;18:133–165. doi: 10.1007/s00145-004-0142-y. [DOI] [Google Scholar]
- 32.Scarani V, et al. The security of practical quantum key distribution. Rev. Mod. Phys. 2009;81:1301. doi: 10.1103/RevModPhys.81.1301. [DOI] [Google Scholar]
- 33.Berta M, Christandl M, Colbeck R, Renes JM, Renner R. The uncertainty principle in the presence of quantum memory. Nat. Phys. 2010;6:659. doi: 10.1038/nphys1734. [DOI] [Google Scholar]
- 34.Coles, P., Berta, M., Tomamichel, M. & Wehner, S. Entropic uncertainty relations and their applications. Rev. Mod. Phys. 89, 015002 (2017).
- 35.Żukowski M, Zeilinger A, Horne MA, Ekert AK. “Event-ready-detectors” bell experiment via entanglement swapping. Phys. Rev. Lett. 1993;71:4287. doi: 10.1103/PhysRevLett.71.4287. [DOI] [PubMed] [Google Scholar]
- 36.Humphreys PC, et al. Deterministic delivery of remote entanglement on a quantum network. Nature. 2018;558:268–273. doi: 10.1038/s41586-018-0200-5. [DOI] [PubMed] [Google Scholar]
- 37.Tan, E. Y.-Z. et al. Improved DIQKD protocols with finite-size analysis. arXiv:2012.08714v1 [quant-ph]. Preprint at https://arxiv.org/abs/2012.08714v1 (2020).
- 38.Dupuis, F., Fawzi, O. & Renner, R. Entropy accumulation. arXiv:1607.01796. Preprint at https://arxiv.org/abs/1607.01796 (2016).
- 39.Arnon-Friedman R, Dupuis F, Fawzi O, Renner R, Vidick T. Practical device-independent quantum cryptography via entropy accumulation. Nat. Commun. 2018;9:459. doi: 10.1038/s41467-017-02307-4. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 40.Dupuis F, Fawzi O. Entropy accumulation with improved second-order term. IEEE Trans. Inf. Theory. 2019;65:7596–7612. doi: 10.1109/TIT.2019.2929564. [DOI] [Google Scholar]
- 41.Zhang Y, Fu H, Knill E. Efficient randomness certification by quantum probability estimation. Phys. Rev. Res. 2020;2:013016. doi: 10.1103/PhysRevResearch.2.013016. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 42.Tan, E. Y.-Z., Schwonnek, R., Goh, K. T., Primaatmaja, I. W. & Lim, C. C.-W. Computing secure key rates for quantum key distribution with untrusted devices. arXiv:1908.11372v1. Preprint at https://arxiv.org/abs/1908.11372 (2019).
- 43.Devetak I, Winter A. Distillation of secret key and entanglement from quantum states. Proc. R. Soc. A Math. Phys. Eng. Sci. 2005;461:207–235. [Google Scholar]
- 44.Frank RL, Lieb EH. Entropy and the uncertainty principle. Ann. Henri Poincaré. 2012;13:1711–1717. doi: 10.1007/s00023-012-0175-y. [DOI] [Google Scholar]
- 45.Gao, L., Junge, M. & LaRacuente, N. Uncertainty principle for quantum channels. In 2018 IEEE International Symposium on Information Theory (ISIT), 996–1000 (2018).
- 46.Wehner S, Winter A. Entropic uncertainty relations—a survey. New J. Phys. 2010;12:025009. doi: 10.1088/1367-2630/12/2/025009. [DOI] [Google Scholar]
- 47.Schwonnek, R. Uncertainty relations in quantum theory, Ph.D thesis, 10.15488/3600 (Leibniz University Hannover, 2018).
- 48.Liu S, Mu L-Z, Fan H. Entropic uncertainty relations for multiple measurements. Phys. Rev. A. 2015;91:042133. doi: 10.1103/PhysRevA.91.042133. [DOI] [Google Scholar]
- 49.Deutsch D. Uncertainty in quantum measurements. Phys. Rev. Lett. 1983;50:631. doi: 10.1103/PhysRevLett.50.631. [DOI] [Google Scholar]
- 50.Maassen, H. in Quantum Probability and Applications V (Proceedings Heidelberg, 1988), Lecture Notes in Mathematics Vol 1442 (Springer, 1990).
- 51.Maassen H, Uffink JB. Generalized entropic uncertainty relations. Phys. Rev. Lett. 1988;60:1103. doi: 10.1103/PhysRevLett.60.1103. [DOI] [PubMed] [Google Scholar]
- 52.Abdelkhalek K, et al. Optimality of entropic uncertainty relations. Int. J. Quant. Inf. 2015;13:1550045. doi: 10.1142/S0219749915500458. [DOI] [Google Scholar]
- 53.Schneeloch J, Broadbent CJ, Walborn SP, Cavalcanti EG, Howell JC. Einstein-Podolsky-Rosen steering inequalities from entropic uncertainty relations. Phys. Rev. A. 2013;87:062103. doi: 10.1103/PhysRevA.87.062103. [DOI] [Google Scholar]
- 54.Schwonnek R. Additivity of entropic uncertainty relations. Quantum. 2018;2:59. doi: 10.22331/q-2018-03-30-59. [DOI] [Google Scholar]
- 55.Riccardi A, Macchiavello C, Maccone L. Tight entropic uncertainty relations for systems with dimension three to five. Phys. Rev. A. 2017;95:032109. doi: 10.1103/PhysRevA.95.032109. [DOI] [Google Scholar]
- 56.Tomamichel M, Hänggi E. The link between entropic uncertainty and nonlocality. J. Phys. A Math. Theor. 2013;46:055301. doi: 10.1088/1751-8113/46/5/055301. [DOI] [Google Scholar]
- 57.Dammeier L, Schwonnek R, Werner R. Uncertainty relations for angular momentum. New J. Phys. 2015;9:093946. [Google Scholar]
- 58.Böttcher A, Spitkovsky I. A gentle guide to the basics of two projections theory. Linear Algebra Appl. 2010;432:1412–1459. doi: 10.1016/j.laa.2009.11.002. [DOI] [Google Scholar]
- 59.Halmos PR. Two subspaces. Trans. Am. Math. Soc. 1969;144:381–389. doi: 10.1090/S0002-9947-1969-0251519-5. [DOI] [Google Scholar]
- 60.Boyd, S. & Vandenberghe, L. Convex Optimization (Cambridge University Press, 2004).
- 61.Schwonnek R, Dammeier L, Werner RF. State-independent uncertainty relations and entanglement detection in noisy systems. Phys. Rev. Lett. 2017;119:170404. doi: 10.1103/PhysRevLett.119.170404. [DOI] [PubMed] [Google Scholar]
- 62.Zhao Y-Y, et al. Entanglement detection by violations of noisy uncertainty relations: a proof of principle. Phys. Rev. Lett. 2019;122:220401. doi: 10.1103/PhysRevLett.122.220401. [DOI] [PubMed] [Google Scholar]
- 63.Henkel F, et al. Highly efficient state-selective submicrosecond photoionization detection of single atoms. Phys. Rev. Lett. 2010;105:253001. doi: 10.1103/PhysRevLett.105.253001. [DOI] [PubMed] [Google Scholar]
- 64.Matsukevich DN, Maunz P, Moehring DL, Olmschenk S, Monroe C. Bell inequality violation with two remote atomic qubits. Phys. Rev. Lett. 2008;100:150404. doi: 10.1103/PhysRevLett.100.150404. [DOI] [PubMed] [Google Scholar]
- 65.Pironio S, et al. Random numbers certified by Bell’s theorem. Nature. 2010;464:1021–1024. doi: 10.1038/nature09008. [DOI] [PubMed] [Google Scholar]
- 66.Giustina M, et al. Bell violation using entangled photons without the fair-sampling assumption. Nature. 2013;497:227–230. doi: 10.1038/nature12012. [DOI] [PubMed] [Google Scholar]
- 67.Christensen B, et al. Detection-loophole-free test of quantum nonlocality, and applications. Phys. Rev. Lett. 2013;111:130406. doi: 10.1103/PhysRevLett.111.130406. [DOI] [PubMed] [Google Scholar]
- 68.Liu Y, et al. Device-independent quantum random-number generation. Nature. 2018;562:548–551. doi: 10.1038/s41586-018-0559-3. [DOI] [PubMed] [Google Scholar]
- 69.Liu, Wen-Zhao, et al. “Device-independent randomness expansion against quantum side information.” Nat. Phys.17, 448–451 (2021).
- 70.Li, Ming-Han, et al. “Experimental realization of device-independent quantum randomness expansion.” Phys. Rev. Lett.126, 050503 (2021). [DOI] [PubMed]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Supplementary Materials
Data Availability Statement
Data sharing is not applicable to this paper as no datasets were generated or analysed during the current study.
The code supporting the plots within this paper is available from the corresponding author upon reasonable request.