We present protocols for quantum key distribution in a prepare-and-measure setup with an asymmetric level of trust. While the device of the sender (Alice) is partially characterized, the receiver’s (Bob’s) device is treated as a black-box. The security of the protocols is based on the assumption that Alice’s prepared states have limited overlaps, but no explicit bound on the Hilbert space dimension is required. The protocols are immune to attacks on the receiver’s device, such as blinding attacks. The users can establish a secret key while continuously monitoring the correct functioning of their devices through observed statistics. We report a proof-of-principle demonstration, involving mostly off-the-shelf equipment, as well as a high-efficiency superconducting nanowire detector. The possibility to establish a secret key is demonstrated over a 4.8 km low-loss optical fiber with a finite-size analysis. The prospects of implementing these protocols over longer distances is discussed.
CITATION STYLE
Ioannou, M., Pereira, M. A., Rusca, D., Grünenfelder, F., Boaron, A., Perrenoud, M., … Brunner, N. (2022). Receiver-Device-Independent Quantum Key Distribution. Quantum, 6. https://doi.org/10.22331/Q-2022-05-24-718
Mendeley helps you to discover research relevant for your work.