Draft:Measurement-device-independent quantum key distribution
{{AFC submission|d|reason|References have not been placed(after comment) thank you|u=Kyle M Jordan|ns=118|decliner=Ozzie10aaaa|declinets=20250327140237|ts=20250127221934}}
{{AFC comment|1=needs more sources, thank you Ozzie10aaaa (talk) 13:33, 12 March 2025 (UTC)}}
----
{{Short description|Technique used for quantum key distribution}}
{{Draft topics|mathematics|physics}}
{{AfC topic|stem}}
Measurement-device-independent quantum key distribution (MDI-QKD) is a family of quantum key distribution (QKD) protocols which use quantum systems to allow two parties to share a cryptographic key over a potentially insecure network. In particular, these protocols can identify any possible attempts to modify either the communication channel or the quantum detectors used to generate the key, with the parties aborting communication in this case. However, MDI-QKD can be compromised if a malicious actor modifies the devices used to prepare quantum systems, or if the secret key is inadvertently revealed by one of the parties, and so is not immune to all vulnerabilities.
Quantum key distribution relies on the users sharing quantum systems (such as photons), with measurements (for instance, of the polarization of light) on these systems being used to generate a random key. Due to the no-cloning theorem, any attempt to copy the keys during transmission can be detected.. During long-distance communications, these quantum systems are often disturbed by the environment and tend to lose their information-carrying properties. The solution is to place quantum repeaters between the two parties, which rely on additional measurements to extend the range of quantum communication. In a practical key distribution system, these repeaters can be modified by malicious third parties in order to change their behaviour and compromise any secure communications. Furthermore, the devices may be designed so as to mimic the behaviour of a secure key distribution system — in order to maintain security, it is essential that the communicating parties can detect modifications of this type. Measurement-device-independent quantum key distribution can be used in these cases to detect any changes to the behaviour of intermediate devices, with the users aborting communication if any tampering has occurred
Measurement-device-independent QKD was initially proposed in 2012 by Lo. as a more practical alternative to fully-device-independent QKD (DI-QKD), which also avoids vulnerabilities in the quantum preparation devices. Since MDI-QKD makes stronger assumptions about the security of the devices used than DI-QKD, it is capable of producing keys at a much higher rate. Early proposals also anticipated that MDI-QKD could be used to enhance the distance over which QKD may be used, and in 2013 the protocol was used to perform QKD across hundreds of kilometers of optical fiber. However, despite using an intermediate station between the two communicating parties, the original MDI-QKD protocol has been shown to have a shorter range when compared to other repeaterless protocols such as BB84 for similar levels of loss. The ideas behind MDI-QKD were later incorporated into more advanced QKD schemes which can achieve long-distance key distribution using repeaters, such as the twin-field QKD protocol proposed in 2015
Description
File:MDI-QKD conceptual new.svg and polarizing beamsplitters to perform Bell measurements.]]
= Overview of the protocol =
The original MDI-QKD consists of three main stages. In each of these, it is assumed that the communicating parties Alice and Bob are in separate laboratories, and that Alice and Bob can send quantum systems to an intermediary Eve using (possibly compromised) quantum channels, and also that Alice and Bob can communicate with each other and with Eve using a public classical channel.{{cn}} The three stages are as follows.
- Preparation: Alice and Bob each prepare a sequence of two-level quantum systems (qubits) similar to the BB84 protocol. In particular, each system should be prepared in one of four quantum states, with the four states forming a pair of mutually unbiased bases (in the case of polarization qubits, these may be horizontally and vertically polarized states, as well as right- and left-hand circular polarizations). Each party should keep a private record of the prepared state for each qubit.{{cn}}
- Measurement: Alice and Bob send the quantum systems one at a time to Eve, who performs particular measurements on the two systems. Before sending the next qubit, Alice and Bob wait for a message from Eve indicating the measurement result. Alice and Bob also keep a record of the measurement result corresponding to each qubit.{{cn}}
- Security verification: Alice and Bob share the basis (but not the particular state) used for each qubit over the classical channel. For all qubit pairs whose bases did not match, Alice and Bob discard the associated data. For the remaining qubits, Alice and Bob reconcile their information on the prepared states based on Eve's measurement result (the exact process for this is detailed below). Alice and Bob can now expect to possess identical information on the prepared states, with any mismatch their state information indicating a flaw in either Eve's measurements or in the quantum channels themselves. Alice and Bob share a fraction of their values on the prepared states to verify this assumption; if the values agree, they know the protocol was secure and use the remaining values as a secret key.{{cn}}
= Ideal implementation =
Suppose that Alice and Bob are in separate laboratories, that each can prepare a qubit in any desired pure state, and that neither laboratory has any undesired communication channels with the outside world. The goal of the protocol is to overcome any detector side-channels; that is, the protocol should prevent a hostile actor from modifying the detectors so as to gain information about the key. For example, the detectors may perform additional measurements on the quantum systems in order to learn about the random values Alice and Bob use to establish a secret key, or may communicate all measurement results to an eavesdropper. We therefore consider the extreme case in which a third-party Eve (who may be malicious) has exclusive access to all detectors used in the protocol. Alice and Bob are both connected to Eve by quantum channels, and furthermore all parties can share classical information over a public authenticated channel. The goal of the MDI-QKD protocol is for Alice and Bob to prepare and send quantum systems to Eve, who performs measurements and publicly announces a result; based on the Eve's responses and their public communications, Alice and Bob either create a shared private key or, if this is not possible, abort the protocol.
The protocol now proceeds as follows.
- Alice and Bob each select a random value , where denotes either Alice or Bob. This value is used to choose between one of two mutually-unbiased qubit bases; for concreteness, we will use
= Physical mechanism for security =
The Bell measurement performed by Eve thus postselects onto those scenarios in which Alice and Bob possess correlated bit values, and those scenarios in which they possess anticorrelated bit values. Despite this, since Eve is unaware of the preparation basis of the qubits, any attempt to mimic the outcomes of the Bell measurement while extracting additional information about the quantum states will, for some choice of basis, unavoidably degrade the correlations between Alice and Bob. The protocol therefore relies on Eve's ability to induce correlations between Alice and Bob while possessing no information of their states.{{cn}}
For instance, suppose that Alice and Bob both use the
- Eve performs only a Bell measurement. Then Eve gains no information about the bit values used; since Alice and Bob reveal the basis after the measurement, she can tell whether Alice and Bob had identical or opposite bit values (corresponding to
|\Phi^\pm\rangle and|\Psi^\pm\rangle outcomes, respectively), but the particular Bell state she obtains is completely uncorrelated with the exact bit values they send. - Eve measures the qubits individually and also performs a Bell measurement. If Eve knew the basis of the two qubits, she could perform a measurement in this basis before doing the Bell state projection, and therefore obtain the bit values without disturbing the states. However, the fact that Alice and Bob choose randomly between two bases means that Eve's measurement necessarily scrambles the qubit states, similar to an eavesdropper in the BB84 protocol. Eve may perform a Bell measurement afterwards, but due to this change in the qubits' states, her results will sometimes differ from that of a true Bell measurement, which Alice and Bob can detect.
- Eve performs an arbitrary two-qubit projective measurement. We again assume that Alice and Bob send states in the
\{|0\rangle, |1\rangle\} basis. If Eve knew the basis of the qubits, then she could project onto the two-qubit basis formed by any two states in the subspace spanned by|\Phi^\pm\rangle together with any two states in the subspace spanned by|\Psi^\pm\rangle , since these pairs give the same outcome; any four projectors chosen this way will yield the correct outcomes as far as Alice and Bob are concerned. Once again, however, the attack is foiled by the use of random bases: if Alice and Bob use the\{|+\rangle, |-\rangle\} , then it is the\{|\Phi^+\rangle, |\Psi^+\rangle\} and\{|\Phi^-\rangle, |\Psi^-\rangle\} pairs that have the same outcomes, so a projection onto a superposition of|\Phi^\pm\rangle will sometimes yield the wrong outcome in this situation. The only projective measurement that always will always provide the correct outcome to Alice and Bob regardless of their basis is therefore the Bell measurement.
While this argument assumes that Eve restricts herself to projective measurements on the two qubits, a more comprehensive analysis of MDI-QKD shows that the protocol is secure even against arbitrary attacks by Eve..{{Cite journal |last1=Curty |first1=Marcos |last2=Xu |first2=Feihu |last3=Cui |first3=Wei |last4=Lim |first4=Charles Ci Wen |last5=Tamaki |first5=Kiyoshi |last6=Lo |first6=Hoi-Kwong |date=2014-04-29 |title=Finite-key analysis for measurement-device-independent quantum key distribution |url=https://www.nature.com/articles/ncomms4732 |journal=Nature Communications |language=en |volume=5 |issue=1 |pages=3732 |doi=10.1038/ncomms4732 |pmid=24776959 |arxiv=1307.1081 |bibcode=2014NatCo...5.3732C |issn=2041-1723}}.
= Practical considerations =
The simple model presented above is not sufficient for a practical implementation of QKD. In addition to the stated assumptions of a secure laboratory environment and reliable preparation of quantum states, the protocol also assumes that complete Bell measurements can be performed, and that the quantum state exists in a two-dimensional Hilbert space, as is the case for the polarization of a single photon. In practice, optical qubits, in particular polarization qubits, are typically used as the quantum system. When restricted to linear optics, no measurement of these qubits can reliably distinguish between all four Bell states; the best one can do is to distinguish between the three cases of (1) the
Secret key rate across lossy channels
While MDI-QKD involves the use of an intermediate station between Alice and Bob, this protocol does not enable the use of long-distance communication using quantum repeaters, as would occur in a quantum network. In particular, the Pirandola-Laurenza-Ottaviani-Banchi (PLOB) bound{{Cite journal |last1=Pirandola |first1=Stefano |last2=Laurenza |first2=Riccardo |last3=Ottaviani |first3=Carlo |last4=Banchi |first4=Leonardo |date=2017-04-26 |title=Fundamental limits of repeaterless quantum communications |journal=Nature Communications |language=en |volume=8 |issue=1 |page=15043 |doi=10.1038/ncomms15043 |issn=2041-1723 |pmc=5414096 |pmid=28443624|arxiv=1512.04945 |bibcode=2017NatCo...815043P }} limits the secret key rate across a repeaterless channel with transmissivity
File:MDI-QKD secret key rate (corrected).svg. By comparison, implementations of MDI-QKD using continuous variables ("qunats") performs better than BB84 over short distances, but much worse than even discrete MDI-QKD over long distances.]]
More recently, features of MDI-QKD have been implemented in more advanced protocols such as twin-field QKD{{Cite journal |last1=Lucamarini |first1=M. |last2=Yuan |first2=Z. L. |last3=Dynes |first3=J. F. |last4=Shields |first4=A. J. |date=2018-05-02 |title=Overcoming the rate–distance limit of quantum key distribution without quantum repeaters |url=https://www.nature.com/articles/s41586-018-0066-6 |journal=Nature |language=en |volume=557 |issue=7705 |pages=400–403 |doi=10.1038/s41586-018-0066-6 |pmid=29720656 |arxiv=1811.06826 |bibcode=2018Natur.557..400L |issn=0028-0836}}. The twin-field protocol keeps the intermediary measurement station of MDI-QKD, but relies on phase-randomized optical fields sent by Alice and Bob, rather than single photons. Since the interference at Eve is first-order interference of the fields, rather than (intensity) interference between two photons, the secret key rate scales as
History
= Device-independent QKD =
The concept of device-independent quantum key distribution (DI-QKD) was described by Mayers and Yao{{Cite arXiv |eprint=quant-ph/0307205 |first1=Dominic |last1=Mayers |first2=Andrew |last2=Yao |title=Self testing quantum apparatus |date=2003-07-28}}, which relies on "self-checking" devices which can certify their own correct operation. An early proposal for fully device-independent quantum key distribution, described in a paper by Acín et al{{Cite journal |last1=Acín |first1=Antonio |last2=Massar |first2=Serge |last3=Pironio |first3=Stefano |date=2006-08-02 |title=Efficient quantum key distribution secure against no-signalling eavesdroppers |url=https://iopscience.iop.org/article/10.1088/1367-2630/8/8/126 |journal=New Journal of Physics |volume=8 |issue=8 |pages=126 |doi=10.1088/1367-2630/8/8/126 |arxiv=quant-ph/0605246 |bibcode=2006NJPh....8..126A |issn=1367-2630}}, relies on violations of a Bell inequality in order to establish security.
So long as no unwanted information leaves Alice's and Bob's labs (as might occur, for example, if an eavesdropper broadcasts the results of each of their measurements), any violation of a Bell inequality by their measurement results implies that Alice and Bob share nonlocal correlations. A third party may modify Alice's and Bob's devices in such a way so as to mimic the outputs of a secure key distribution protocol, but without additional communication channels these modified devices can produce only locally-correlated outputs{{Cite journal |last1=Pirandola |first1=S. |last2=Andersen |first2=U. L. |last3=Banchi |first3=L. |last4=Berta |first4=M. |last5=Bunandar |first5=D. |last6=Colbeck |first6=R. |last7=Englund |first7=D. |last8=Gehring |first8=T. |last9=Lupo |first9=C. |last10=Ottaviani |first10=C. |last11=Pereira |first11=J. L. |last12=Razavi |first12=M. |last13=Shaari |first13=J. Shamsul |last14=Tomamichel |first14=M. |last15=Usenko |first15=V. C. |date=2020-12-14 |title=Advances in quantum cryptography |url=https://opg.optica.org/aop/abstract.cfm?uri=aop-12-4-1012 |journal=Advances in Optics and Photonics |language=EN |volume=12 |issue=4 |pages=1012–1236 |doi=10.1364/AOP.361502 |arxiv=1906.01645 |bibcode=2020AdOP...12.1012P |issn=1943-8206}}. By testing a statistic such as the Clauser-Horne-Shimony-Holt (CHSH) inequality, Alice and Bob can verify whether nonlocal correlations exist and therefore rule out the presence of such modifications (or, at least, modifications which might provide a third party with useful information about the key).{{cn}}
Like other implementations of Bell inequality tests, DI-QKD is subject to so-called loopholes, of which the most important is the detection loophole; to overcome this, the detectors used in the protocol must have very high efficiencies. This strong requirement on detector is both technologically challenging and means that Alice and Bob generate a secret key at a low rate{{Cite journal |last=Liu |first=Wen-Zhao |date=2022-07-27 |title=Toward a Photonic Demonstration of Device-Independent Quantum Key Distribution |url=https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.129.050502 |journal=Physical Review Letters |volume=129 |issue=5 |page=050502 |doi=10.1103/PhysRevLett.129.050502|pmid=35960585 |bibcode=2022PhRvL.129e0502L }}
= Measurement-device-independent QKD =
Measurement-device-independent QKD was proposed in 2012 by Lo et al as a workaround to this situation{{Cite journal |last=Lo |first=Hoi-Kwong |date=2012-03-30 |title=Measurement-Device-Independent Quantum Key Distribution |url=https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.108.130503 |journal=Physical Review Letters |volume=108 |issue=13 |page=130503 |doi=10.1103/PhysRevLett.108.130503|pmid=22540686 |arxiv=1109.1473 |bibcode=2012PhRvL.108m0503L }}. Since MDI-QKD relies on reliable preparation of quantum states, it makes stronger assumptions about the workings of devices than fully DI-QKD, and so reintroduces possible side-channels in the preparation device. However, this comes with much less stringent requirements for technical implementations, and allows for the use of conventional detectors with lower quantum efficiency while still being immune to detector side-channel attacks. Preparation side-channels can still be overcome using techniques such as the decoy-state method{{Cite journal |last=Liu |first=Yang |date=2013 |title=Experimental Measurement-Device-Independent Quantum Key Distribution |url=https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.111.130502 |journal=Physical Review Letters |volume=111 |issue=13 |page=130502 |doi=10.1103/PhysRevLett.111.130502|pmid=24116758 |arxiv=1209.6178 |bibcode=2013PhRvL.111m0502L }}. An early proof-of-principle experimental demonstration using a polarization encoding was performed in 2013 by Rubenok el al{{Cite journal |last=Rubenok |first=A. |date=2013-09-23 |title=Real-World Two-Photon Interference and Proof-of-Principle Quantum Key Distribution Immune to Detector Attacks |url=https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.111.130501 |journal=Physical Review Letters |volume=111 |issue=13 |page=130501 |doi=10.1103/PhysRevLett.111.130501|pmid=24116757 |arxiv=1304.2463 |bibcode=2013PhRvL.111m0501R }}; later experiments have implemented MDI-QKD across more than 400 km of optical fiber{{Cite journal |last=Yin |first=Hua-Lei |date=2016-11-02 |title=Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber |url=https://journals.aps.org/prl/abstract/10.1103/PhysRevLett.117.190501 |journal=Physical Review Letters |volume=117 |issue=19 |page=190501 |doi=10.1103/PhysRevLett.117.190501|pmid=27858431 |arxiv=1606.06821 |bibcode=2016PhRvL.117s0501Y }}. A continuous-variable version of MDI-QKD presented by Pirandola et al is capable of achieving higher secret key rates over distances of a few kilometers in standard optical fiber, but performs much worse over large distances{{Cite journal |last1=Pirandola |first1=Stefano |last2=Ottaviani |first2=Carlo |last3=Spedalieri |first3=Gaetana |last4=Weedbrook |first4=Christian |last5=Braunstein |first5=Samuel L. |last6=Lloyd |first6=Seth |last7=Gehring |first7=Tobias |last8=Jacobsen |first8=Christian S. |last9=Andersen |first9=Ulrik L. |date=2015-05-25 |title=High-rate measurement-device-independent quantum cryptography |url=https://www.nature.com/articles/nphoton.2015.83 |journal=Nature Photonics |language=en |volume=9 |issue=6 |pages=397–402 |doi=10.1038/nphoton.2015.83 |arxiv=1312.4104 |bibcode=2015NaPho...9..397P |issn=1749-4893}}
See also
References
{{Reflist}}
Further reading
- Ramona Wolf, Quantum Key Distribution: An Introduction with Exercises (Springer, 2021)
- Feihu Xu, Marcos Curty, Bing Qi and Hoi-Kwong Lo (2013), "[https://iopscience.iop.org/article/10.1088/1367-2630/15/11/113007/pdf Practical aspects of measurement-device-independent quantum key distribution]"
- Yan-Lin Tang, Hua-Lei Yin, Qi Zhao, Hui Liu, Xiang-Xiang Sun, Ming-Qi Huang, Wei-Jun Zhang, Si-Jing Chen, and Lu Zhang et al (2016), "[https://journals.aps.org/prx/pdf/10.1103/PhysRevX.6.011024 Measurement-Device-Independent Quantum Key Distribution over Untrustful Metropolitan Network]"