Loading…

Experimental quantum key distribution certified by Bell's theorem

Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorization to provide security against eavesdropping attacks. Remarkably, quantum key distribution protocols such as the Bennett-Brassard scheme provide information-theoretic securit...

Full description

Saved in:
Bibliographic Details
Published in:Nature (London) 2022-07, Vol.607 (7920), p.682-686
Main Authors: Nadlinger, D P, Drmota, P, Nichol, B C, Araneda, G, Main, D, Srinivas, R, Lucas, D M, Ballance, C J, Ivanov, K, Tan, E Y-Z, Sekatski, P, Urbanke, R L, Renner, R, Sangouard, N, Bancal, J-D
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorization to provide security against eavesdropping attacks. Remarkably, quantum key distribution protocols such as the Bennett-Brassard scheme provide information-theoretic security against such attacks, a much stronger form of security unreachable by classical means. However, quantum protocols realized so far are subject to a new class of attacks exploiting a mismatch between the quantum states or measurements implemented and their theoretical modelling, as demonstrated in numerous experiments . Here we present the experimental realization of a complete quantum key distribution protocol immune to these vulnerabilities, following Ekert's pioneering proposal to use entanglement to bound an adversary's information from Bell's theorem . By combining theoretical developments with an improved optical fibre link generating entanglement between two trapped-ion qubits, we obtain 95,628 key bits with device-independent security from 1.5 million Bell pairs created during eight hours of run time. We take steps to ensure that information on the measurement results is inaccessible to an eavesdropper. These measurements are performed without space-like separation. Our result shows that provably secure cryptography under general assumptions is possible with real-world devices, and paves the way for further quantum information applications based on the device-independence principle.
ISSN:0028-0836
1476-4687
DOI:10.1038/s41586-022-04941-5