Experimental quantum key distribution certified by Bell's theorem

被引:131
|
作者
Nadlinger, D. P. [1 ]
Drmota, P. [1 ]
Nichol, B. C. [1 ]
Araneda, G. [1 ]
Main, D. [1 ]
Srinivas, R. [1 ]
Lucas, D. M. [1 ]
Ballance, C. J. [1 ]
Ivanov, K. [2 ]
Tan, E. Y-Z [3 ]
Sekatski, P. [4 ]
Urbanke, R. L. [2 ]
Renner, R. [3 ]
Sangouard, N. [5 ]
Bancal, J-D [5 ]
机构
[1] Univ Oxford, Dept Phys, Clarendon Lab, Oxford, England
[2] Ecole Polytech Fed Lausanne, Sch Comp & Commun Sci, Lausanne, Switzerland
[3] Swiss Fed Inst Technol, Inst Theoret Phys, Zurich, Switzerland
[4] Univ Geneva, Dept Appl Phys, Geneva, Switzerland
[5] Univ Paris Saclay, Inst Phys Theor, CNRS, CEA, Gif Sur Yvette, France
基金
英国工程与自然科学研究理事会; 瑞士国家科学基金会;
关键词
D O I
10.1038/s41586-022-04941-5
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorization(1) to provide security against eavesdropping attacks. Remarkably, quantum key distribution protocols such as the Bennett-Brassard scheme(2) provide information-theoretic security against such attacks, a much stronger form of security unreachable by classical means. However, quantum protocols realized so far are subject to a new class of attacks exploiting a mismatch between the quantum states or measurements implemented and their theoretical modelling, as demonstrated in numerous experiments(3-6). Here we present the experimental realization of a complete quantum key distribution protocol immune to these vulnerabilities, following Ekert's pioneering proposal(7) to use entanglement to bound an adversary's information from Bell's theorem(8). By combining theoretical developments with an improved optical fibre link generating entanglement between two trapped-ion qubits, we obtain 95,628 key bits with device-independent security(9-12) from 1.5 million Bell pairs created during eight hours of run time. We take steps to ensure that information on the measurement results is inaccessible to an eavesdropper. These measurements are performed without space-like separation. Our result shows that provably secure cryptography under general assumptions is possible with real-world devices, and paves the way for further quantum information applications based on the device-independence principle.
引用
收藏
页码:682 / +
页数:6
相关论文
共 50 条
  • [31] Simplified quantum optical Stokes observables and Bell’s theorem
    Konrad Schlichtholz
    Bianka Woloncewicz
    Marek Żukowski
    Scientific Reports, 12
  • [32] On Bell's theorem
    Socolovsky, M
    REVISTA MEXICANA DE FISICA, 2002, 48 (04) : 384 - 390
  • [33] Oscillating photonic Bell state from a semiconductor quantum dot for quantum key distribution
    Pennacchietti, Matteo
    Cunard, Brady
    Nahar, Shlok
    Zeeshan, Mohd
    Gangopadhyay, Sayan
    Poole, Philip J.
    Dalacu, Dan
    Fognini, Andreas
    Joens, Klaus D.
    Zwiller, Val
    Jennewein, Thomas
    Luetkenhaus, Norbert
    Reimer, Michael E.
    COMMUNICATIONS PHYSICS, 2024, 7 (01)
  • [34] Oscillating photonic Bell state from a semiconductor quantum dot for quantum key distribution
    Matteo Pennacchietti
    Brady Cunard
    Shlok Nahar
    Mohd Zeeshan
    Sayan Gangopadhyay
    Philip J. Poole
    Dan Dalacu
    Andreas Fognini
    Klaus D. Jöns
    Val Zwiller
    Thomas Jennewein
    Norbert Lütkenhaus
    Michael E. Reimer
    Communications Physics, 7
  • [35] Efficient quantum key distribution scheme using the Bell state measurement
    College of Computer Science and Technology, Xuchang University, Xuchang 461000, China
    不详
    Dianzi Keji Diaxue Xuebao, 2006, 6 (917-919+923):
  • [36] Device-Independent Quantum Key Distribution with Local Bell Test
    Lim, Charles Ci Wen
    Portmann, Christopher
    Tomamichel, Marco
    Renner, Renato
    Gisin, Nicolas
    PHYSICAL REVIEW X, 2013, 3 (03):
  • [37] Quantum Key Distribution Based on Random Grouping Bell State Measurement
    Song, Dan
    Chen, Dongxu
    IEEE COMMUNICATIONS LETTERS, 2020, 24 (07) : 1496 - 1499
  • [38] Improving the total efficiency of quantum key distribution by comparing Bell states
    Yuan, Hao
    Song, Jun
    Han, Lian-Fang
    Hou, Kui
    Shi, Shou-hua
    OPTICS COMMUNICATIONS, 2008, 281 (18) : 4803 - 4806
  • [39] Quantum determined key distribution scheme using the Bell state measurement
    Li, Xiaoyu
    Zhang, Dexi
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 25 - +
  • [40] Efficient quantum key distribution scheme using the bell state measurement
    Li, XY
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2003, 14 (06): : 757 - 763