A Caltech Library Service

Robust device independent quantum key distribution

Vazirani, Umesh and Vidick, Thomas (2014) Robust device independent quantum key distribution. In: Proceedings of the 5th conference on Innovations in theoretical computer science. Association for Computing Machinery , New York, pp. 35-36. ISBN 978-1-4503-2698-8.

PDF - Submitted Version
See Usage Policy.


Use this Persistent URL to link to this item:


Quantum cryptography is based on the discovery that the laws of quantum mechanics allow levels of security that are impossible to replicate in a classical world. Can such levels of security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This fundamental question in quantum cryptography dates back to the early nineties when the challenge of achieving device independent quantum key distribution, or DIQKD, was first formulated. We answer this challenge affirmatively by exhibiting a robust protocol for DIQKD and rigorously proving its security. The protocol achieves a linear key rate while tolerating a constant noise rate in the devices. The security proof assumes only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and any adversary's laboratory. In particular, we emphasize that the devices may have quantum memory. All previous proofs of security relied either on the use of many independent pairs of devices, or on the absence of noise. To prove security for a DIQKD protocol it is necessary to establish at least that the generated key is truly random even in the presence of a quantum adversary. This is already a challenge, one that was recently resolved. DIQKD is substantially harder, since now the protocol must also guarantee that the key is completely secret from the quantum adversary's point of view, and the entire protocol is robust against noise; this in spite of the substantial amounts of classical information leaked to the adversary throughout the protocol, as part of the error estimation and information reconciliation procedures. Our proof of security builds upon a number of techniques, including randomness extractors that are secure against quantum storage as well as ideas originating in the coding strategy used in the proof of the Holevo-Schumacher-Westmoreland theorem which we apply to bound correlations across multiple rounds in a way not unrelated to information-theoretic proofs of the parallel repetition property for multiplayer games. Our main result can be understood as a new bound on monogamy of entanglement in the type of complex scenario that arises in a key distribution protocol.

Item Type:Book Section
Related URLs:
URLURL TypeDescription Paper
Vidick, Thomas0000-0002-6405-365X
Alternate Title:Fully device independent quantum key distribution
Additional Information:© 2014 ACM. Supported by ARO Grant W911NF-12-1-0541, NSF Grant CCF- 0905626 and Templeton Foundation Grant 21674. Part of this work was completed while the author was visiting UC Berkeley. Supported by the National Science Foundation under Grant No. 0844626 and by the Ministry of Education, Singapore under the Tier 3 grant MOE2012-T3-1-009.
Funding AgencyGrant Number
Army Research Office (ARO)W911NF-12-1-0541
Templeton Foundation21674
Ministry of Education (Singapore)MOE2012-T3-1-009
Subject Keywords:quantum key distribution; CHSH game; monogamy; certified randomness; device-independence
Record Number:CaltechAUTHORS:20140909-145320191
Persistent URL:
Usage Policy:No commercial reproduction, distribution, display or performance rights in this work are provided.
ID Code:49504
Deposited By: Tony Diaz
Deposited On:10 Sep 2014 16:53
Last Modified:10 Nov 2021 18:44

Repository Staff Only: item control page