Receiver-Device-Independent Quantum Key Distribution

8Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.

Abstract

We present protocols for quantum key distribution in a prepare-and-measure setup with an asymmetric level of trust. While the device of the sender (Alice) is partially characterized, the receiver’s (Bob’s) device is treated as a black-box. The security of the protocols is based on the assumption that Alice’s prepared states have limited overlaps, but no explicit bound on the Hilbert space dimension is required. The protocols are immune to attacks on the receiver’s device, such as blinding attacks. The users can establish a secret key while continuously monitoring the correct functioning of their devices through observed statistics. We report a proof-of-principle demonstration, involving mostly off-the-shelf equipment, as well as a high-efficiency superconducting nanowire detector. The possibility to establish a secret key is demonstrated over a 4.8 km low-loss optical fiber with a finite-size analysis. The prospects of implementing these protocols over longer distances is discussed.

Cite

CITATION STYLE

APA

Ioannou, M., Pereira, M. A., Rusca, D., Grünenfelder, F., Boaron, A., Perrenoud, M., … Brunner, N. (2022). Receiver-Device-Independent Quantum Key Distribution. Quantum, 6. https://doi.org/10.22331/Q-2022-05-24-718

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free