Experimental quantum key distribution certified by Bell's theorem
D. P. Nadlinger (),
P. Drmota,
B. C. Nichol,
G. Araneda,
D. Main,
R. Srinivas,
D. M. Lucas,
C. J. Ballance (),
K. Ivanov,
E. Y.-Z. Tan,
P. Sekatski,
R. L. Urbanke,
R. Renner,
N. Sangouard () and
J.-D. Bancal ()
Additional contact information
D. P. Nadlinger: University of Oxford
P. Drmota: University of Oxford
B. C. Nichol: University of Oxford
G. Araneda: University of Oxford
D. Main: University of Oxford
R. Srinivas: University of Oxford
D. M. Lucas: University of Oxford
C. J. Ballance: University of Oxford
K. Ivanov: School of Computer and Communication Sciences, EPFL
E. Y.-Z. Tan: ETH Zürich
P. Sekatski: University of Geneva
R. L. Urbanke: School of Computer and Communication Sciences, EPFL
R. Renner: ETH Zürich
N. Sangouard: Université Paris-Saclay, CEA, CNRS, Institut de Physique Théorique
J.-D. Bancal: Université Paris-Saclay, CEA, CNRS, Institut de Physique Théorique
Nature, 2022, vol. 607, issue 7920, 682-686
Abstract:
Abstract Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorization1 to provide security against eavesdropping attacks. Remarkably, quantum key distribution protocols such as the Bennett–Brassard scheme2 provide information-theoretic security against such attacks, a much stronger form of security unreachable by classical means. However, quantum protocols realized so far are subject to a new class of attacks exploiting a mismatch between the quantum states or measurements implemented and their theoretical modelling, as demonstrated in numerous experiments3–6. Here we present the experimental realization of a complete quantum key distribution protocol immune to these vulnerabilities, following Ekert’s pioneering proposal7 to use entanglement to bound an adversary’s information from Bell’s theorem8. By combining theoretical developments with an improved optical fibre link generating entanglement between two trapped-ion qubits, we obtain 95,628 key bits with device-independent security9–12 from 1.5 million Bell pairs created during eight hours of run time. We take steps to ensure that information on the measurement results is inaccessible to an eavesdropper. These measurements are performed without space-like separation. Our result shows that provably secure cryptography under general assumptions is possible with real-world devices, and paves the way for further quantum information applications based on the device-independence principle.
Date: 2022
References: Add references at CitEc
Citations:
Downloads: (external link)
https://www.nature.com/articles/s41586-022-04941-5 Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:nat:nature:v:607:y:2022:i:7920:d:10.1038_s41586-022-04941-5
Ordering information: This journal article can be ordered from
https://www.nature.com/
DOI: 10.1038/s41586-022-04941-5
Access Statistics for this article
Nature is currently edited by Magdalena Skipper
More articles in Nature from Nature
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().