-
Composable framework for device-independent state certification
Authors:
Rutvij Bhavsar,
Lewis Wooltorton,
Joonwoo Bae
Abstract:
Certifying a quantum state in a device-independent (DI) manner, in which no trust is placed on the internal workings of any physical components, is a fundamental task bearing various applications in quantum information theory. The composability of a state certification protocol is key to its integration as a subroutine within information-theoretic protocols. In this work, we present a composable c…
▽ More
Certifying a quantum state in a device-independent (DI) manner, in which no trust is placed on the internal workings of any physical components, is a fundamental task bearing various applications in quantum information theory. The composability of a state certification protocol is key to its integration as a subroutine within information-theoretic protocols. In this work, we present a composable certification of quantum states in a DI manner under the assumption that a source prepares a finite sequence of independent quantum states that are not necessarily identical. We show that the security relies on the DI analog of the fidelity, called the extractability. We develop methods to compute this quantity under local operations and classical communication in certain Bell scenarios that self-test the singlet state, which may also be of independent interest. Finally, we demonstrate our framework by certifying the singlet states in a composable and DI manner using the Clauser-Horne-Shimony-Holt inequality.
△ Less
Submitted 11 May, 2025;
originally announced May 2025.
-
Bipartite entanglement is sufficient for standard device-independent conference key agreement
Authors:
Lewis Wooltorton,
Peter Brown,
Roger Colbeck
Abstract:
Conference key agreement (CKA) aims to establish shared, private randomness among many separated parties in a network. Device-independent (DI) CKA is a variant in which no assumptions are placed on the nature of the source, or the measurements performed by each party. So far, DICKA protocols largely fall into two categories: those that rely on violating a joint Bell inequality using genuinely mult…
▽ More
Conference key agreement (CKA) aims to establish shared, private randomness among many separated parties in a network. Device-independent (DI) CKA is a variant in which no assumptions are placed on the nature of the source, or the measurements performed by each party. So far, DICKA protocols largely fall into two categories: those that rely on violating a joint Bell inequality using genuinely multi-partite entangled states, and those that concatenate many bipartite protocols. The question of whether a hybrid protocol exists, where a multi-partite Bell inequality can be violated using only bipartite entanglement, was asked by Grasselli et al. in [Quantum 7, 980, (2023)]. We answer this question affirmatively, by constructing an asymptotically secure DICKA protocol achieving the same rate as the concatenation of bipartite DIQKD, yet relying on a single joint Bell violation. Our results prompt further discussion on the benefits of multi-partite entanglement for DICKA over its bipartite alternative, and we give an overview of different arguments for near-term devices.
△ Less
Submitted 27 March, 2025;
originally announced March 2025.
-
Self-testing in the compiled setting via tilted-CHSH inequalities
Authors:
Arthur Mehta,
Connor Paddock,
Lewis Wooltorton
Abstract:
In a Bell scenario, a classical verifier interacts with two non-communicating (quantum) provers. To an observer, the behaviour of the provers in this interaction is modeled by correlations. Certain correlations allow the verifier to certify, or self-test, the underlying quantum state and measurements. Self-testing underpins numerous device-independent quantum protocols with a classical verifier, y…
▽ More
In a Bell scenario, a classical verifier interacts with two non-communicating (quantum) provers. To an observer, the behaviour of the provers in this interaction is modeled by correlations. Certain correlations allow the verifier to certify, or self-test, the underlying quantum state and measurements. Self-testing underpins numerous device-independent quantum protocols with a classical verifier, yet, a drawback of using self-tests in applications is the required no-communicating assumption between the provers. To address this issue, Kalai et al.~(STOC '23) introduce a cryptographic procedure which "compiles" these scenarios into a multi-round interaction between a verifier and a single computationally bounded prover. In this work, we formalize a notion of self-testing for compiled two-prover Bell scenarios. In addition, we prove that the quantum value is preserved under compilation for the family of tilted-CHSH inequalities (up to negligible factors). We also show that any maximal violation in the compiled setting of inequalities from this family satisfies a notion of self-testing in the compiled setting. More specifically, we show that maximal violations of these inequalities imply the existence of an efficient isometry that recovers the measurement action on the state after the first round.
△ Less
Submitted 9 April, 2025; v1 submitted 7 June, 2024;
originally announced June 2024.
-
Device-independent quantum key distribution with arbitrarily small nonlocality
Authors:
Lewis Wooltorton,
Peter Brown,
Roger Colbeck
Abstract:
Device-independent quantum key distribution (DIQKD) allows two users to set up shared cryptographic key without the need to trust the quantum devices used. Doing so requires nonlocal correlations between the users. However, in [Phys. Rev. Lett. 127, 050503 (2021)] it was shown that for known protocols nonlocality is not always sufficient, leading to the question of whether there is a fundamental l…
▽ More
Device-independent quantum key distribution (DIQKD) allows two users to set up shared cryptographic key without the need to trust the quantum devices used. Doing so requires nonlocal correlations between the users. However, in [Phys. Rev. Lett. 127, 050503 (2021)] it was shown that for known protocols nonlocality is not always sufficient, leading to the question of whether there is a fundamental lower bound on the minimum amount of nonlocality needed for any DIQKD implementation. Here we show that no such bound exists, giving schemes that achieve key with correlations arbitrarily close to the local set. Furthermore, some of our constructions achieve the maximum of 1 bit of key per pair of entangled qubits. We achieve this by studying a family of Bell-inequalities that constitute all self-tests of the maximally entangled state with a single linear Bell expression. Within this family there exist non-local correlations with the property that one pair of inputs yield outputs arbitrarily close to perfect key. Such correlations exist for a range of Clauser-Horne-Shimony-Holt (CHSH) values, including those arbitrarily close to the classical bound. Finally, we show the existence of quantum correlations that can generate both perfect key and perfect randomness simultaneously, whilst also displaying arbitrarily small CHSH violation; this opens up the possibility of a new class of cryptographic protocol.
△ Less
Submitted 24 May, 2024; v1 submitted 18 September, 2023;
originally announced September 2023.
-
Expanding bipartite Bell inequalities for maximum multi-partite randomness
Authors:
Lewis Wooltorton,
Peter Brown,
Roger Colbeck
Abstract:
Nonlocal tests on multi-partite quantum correlations form the basis of protocols that certify randomness in a device-independent (DI) way. Such correlations admit a rich structure, making the task of choosing an appropriate test difficult. For example, extremal Bell inequalities are tight witnesses of nonlocality, but achieving their maximum violation places constraints on the underlying quantum s…
▽ More
Nonlocal tests on multi-partite quantum correlations form the basis of protocols that certify randomness in a device-independent (DI) way. Such correlations admit a rich structure, making the task of choosing an appropriate test difficult. For example, extremal Bell inequalities are tight witnesses of nonlocality, but achieving their maximum violation places constraints on the underlying quantum system, which can reduce the rate of randomness generation. As a result there is often a trade-off between maximum randomness and the amount of violation of a given Bell inequality. Here, we explore this trade-off for more than two parties. More precisely, we study the maximum amount of randomness that can be certified by correlations exhibiting a violation of the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality. We find that maximum quantum violation and maximum randomness are incompatible for any even number of parties, with incompatibility diminishing as the number of parties grows, and conjecture the precise trade-off. We also show that maximum MABK violation is not necessary for maximum randomness for odd numbers of parties. To obtain our results, we derive new families of Bell inequalities certifying maximum randomness from a technique for randomness certification, which we call ``expanding Bell inequalities''. Our technique allows a bipartite Bell expression to be used as a seed, and transformed into a multi-partite Bell inequality tailored for randomness certification, showing how intuition learned in the bipartite case can find use in more complex scenarios.
△ Less
Submitted 11 December, 2024; v1 submitted 14 August, 2023;
originally announced August 2023.
-
Satellite-Based Quantum Key Distribution in the Presence of Bypass Channels
Authors:
Masoud Ghalaii,
Sima Bahrani,
Carlo Liorni,
Federico Grasselli,
Hermann Kampermann,
Lewis Wooltorton,
Rupesh Kumar,
Stefano Pirandola,
Timothy P. Spiller,
Alexander Ling,
Bruno Huttner,
Mohsen Razavi
Abstract:
The security of prepare-and-measure satellite-based quantum key distribution (QKD), under restricted eavesdropping scenarios, is addressed. We particularly consider cases where the eavesdropper, Eve, has limited access to the transmitted signal by Alice, and/or Bob's receiver station. This restriction is modeled by lossy channels between Alice/Bob and Eve, where the transmissivity of such channels…
▽ More
The security of prepare-and-measure satellite-based quantum key distribution (QKD), under restricted eavesdropping scenarios, is addressed. We particularly consider cases where the eavesdropper, Eve, has limited access to the transmitted signal by Alice, and/or Bob's receiver station. This restriction is modeled by lossy channels between Alice/Bob and Eve, where the transmissivity of such channels can, in principle, be bounded by monitoring techniques. An artefact of such lossy channels is the possibility of having {\it bypass} channels, those which are not accessible to Eve, but may not necessarily be characterized by the users either. This creates interesting, unexplored, scenarios for analyzing QKD security. In this paper, we obtain generic bounds on the key rate in the presence of bypass channels and apply them to continuous-variable QKD protocols with Gaussian encoding with direct and reverse reconciliation. We find regimes of operation in which the above restrictions on Eve can considerably improve system performance. We also develop customised bounds for several protocols in the BB84 family and show that, in certain regimes, even the simple protocol of BB84 with weak coherent pulses is able to offer positive key rates at high channel losses, which would otherwise be impossible under an unrestricted Eve. In this case the limitation on Eve would allow Alice to send signals with larger intensities than the optimal value under an ideal Eve, which effectively reduces the effective channel loss. In all these cases, the part of the transmitted signal that does not reach Eve can play a non-trivial role in specifying the achievable key rate. Our work opens up new security frameworks for spaceborne quantum communications systems.
△ Less
Submitted 27 July, 2023; v1 submitted 9 December, 2022;
originally announced December 2022.
-
Tight analytic bound on the trade-off between device-independent randomness and nonlocality
Authors:
Lewis Wooltorton,
Peter Brown,
Roger Colbeck
Abstract:
Two parties sharing entangled quantum systems can generate correlations that cannot be produced using only shared classical resources. These nonlocal correlations are a fundamental feature of quantum theory but also have practical applications. For instance, they can be used for device-independent (DI) random number generation, whose security is certified independently of the operations performed…
▽ More
Two parties sharing entangled quantum systems can generate correlations that cannot be produced using only shared classical resources. These nonlocal correlations are a fundamental feature of quantum theory but also have practical applications. For instance, they can be used for device-independent (DI) random number generation, whose security is certified independently of the operations performed inside the devices. The amount of certifiable randomness that can be generated from some given non-local correlations is a key quantity of interest. Here we derive tight analytic bounds on the maximum certifiable randomness as a function of the nonlocality as expressed using the Clauser-Horne-Shimony-Holt (CHSH) value. We show that for every CHSH value greater than the local value ($2$) and up to $3\sqrt{3}/2\approx2.598$ there exist quantum correlations with that CHSH value that certify a maximal two bits of global randomness. Beyond this CHSH value the maximum certifiable randomness drops. We give a second family of Bell inequalities for CHSH values above $3\sqrt{3}/2$, and show that they certify the maximum possible randomness for the given CHSH value. Our work hence provides an achievable upper bound on the amount of randomness that can be certified for any CHSH value. We illustrate the robustness of our results, and how they could be used to improve randomness generation rates in practice, using a Werner state noise model.
△ Less
Submitted 5 October, 2022; v1 submitted 29 April, 2022;
originally announced May 2022.
-
Twin-field quantum key distribution with fully discrete phase randomization
Authors:
Guillermo CurrĂ¡s-Lorenzo,
Lewis Wooltorton,
Mohsen Razavi
Abstract:
Twin-field (TF) quantum key distribution (QKD) can overcome fundamental secret-key-rate bounds on point-to-point QKD links, allowing us to reach longer distances than ever before. Since its introduction, several TF-QKD variants have been proposed, and some of them have already been implemented experimentally. Most of them assume that the users can emit weak coherent pulses with a continuous random…
▽ More
Twin-field (TF) quantum key distribution (QKD) can overcome fundamental secret-key-rate bounds on point-to-point QKD links, allowing us to reach longer distances than ever before. Since its introduction, several TF-QKD variants have been proposed, and some of them have already been implemented experimentally. Most of them assume that the users can emit weak coherent pulses with a continuous random phase. In practice, this assumption is often not satisfied, which could open up security loopholes in their implementations. To close this loophole, we propose and prove the security of a TF-QKD variant that relies exclusively on discrete phase randomisation. Remarkably, our results show that it can also provide higher secret-key rates than counterpart protocols that rely on continuous phase randomisation.
△ Less
Submitted 7 August, 2020;
originally announced August 2020.