Quantum Cryptography

We develop new mathematical techniques that can be used in security proofs for quantum cryptography, making it easier to develop and certify novel protocols.

Quantum cryptography relies on inherently quantum mechanical behaviour to perform tasks such as secure communication and generating private randomness. It is a fairly mature quantum technology, and a number of commercial devices are available today.

However, proving the security of quantum protocols is often a challenging task, especially when issues of finite key length and non-i.i.d. behaviour — that is, when the devices are not independent and identically distributed — have to be taken into account.

Device-independent cryptography

Standard quantum key distribution vs device-independent quantum key distribution
Standard quantum key distribution protocols rely on detailed characterisation of the users’ devices. In device-independent quantum key distribution, only minimal knowledge of the internal workings of the 'black box' devices is required.

Currently, one of our research focuses is the development of proof techniques applicable to device-independent protocols [1,2]. This field sits at the intersection of quantum foundations and cryptography, exploiting 'nonlocal' quantum behaviour to certify protocol security while only requiring minimal assumptions about the devices. This very strong form of security comes with the drawback that only a few proof techniques are known for these scenarios, making it difficult to develop protocols that can be both proven secure and implemented in the lab. We aim to find various methods [3,4] to help close this gap and explore possibilities for other device-independent protocols.

References

  1. Rotem Arnon-Friedman, Renato Renner and Thomas Vidick. Simple and tight device-independent security proofs. SIAM J. Comput. 48.1, 181-225 (2019). external pagedoi: 10.1137/18M1174726 external pagearXiv:1607.01797
  2. Rotem Arnon-Friedman, Frédéric Dupuis, Omar Fawzi, Renato Renner and Thomas Vidick. Practical device-independent quantum cryptography via entropy accumulation. Nat. Commun. 9, 459 (2018). external pagedoi: 10.1038/s41467-017-02307-4
  3. Ernest Y.-Z. Tan, Charles C.-W. Lim and Renato Renner. Advantage distillation for device-independent quantum key distribution. Phys. Rev. Lett. 124, 020502 (2020). external pagedoi: 10.1103/PhysRevLett.124.020502 external pagearXiv:1903.10535
  4. Ernest Y.-Z. Tan, René Schwonnek, Koon Tong Goh, Ignatius William Primaatmaja and Charles C.-W. Lim. Computing secure key rates for quantum key distribution with untrusted devices. external pagearXiv:1908.11372
JavaScript has been disabled in your browser