TY - JOUR
T1 - Experimental semi-quantum key distribution with classical users
AU - Massa, Francesco
AU - Yadav, Preeti
AU - Moqanaki, Amir
AU - Krawec, Walter O.
AU - Mateus, Paulo
AU - Paunković, Nikola
AU - Souto, André
AU - Walther, Philip
N1 - Funding Information:
bon. P.Y. acknowledges the support of DP-PMI and FCT (Portugal) through the scholarship PD/BD/113648/2015. W.K. is partially supported by NSF Grant No. 1812070. N.P. acknowledges FCT project CERN/FIS-PAR/0023/2019, as well as the FCT Estímulo ao Emprego Científico grant no. CEECIND/04594/2017/CP1393/CT000. A.S. acknowledges funds granted to LaSIGE Research Unit, ref. UID/CEC/00408/2013. P.W. acknowledges support from the research platform TURIS, from the European Commission through ErBeStA (No.800942), from the Austrian Science Fund (FWF)
Funding Information:
We would like to thank Giulia Rubino for help with some figures and Borivoje Dakićand Ämin Baumeler for useful discussions. P.Y., P.M., N.P. and A.S. acknowledge the support of SQIG – Security and Quantum Information Group, the In-stituto de Telecomunicac¸ões (IT) Research Unit, ref. UIDB/50008/2020 (actions QuRUNNER, QUESTS), funded by Funda¸cão para a Cêencia e Tecnologia (FCT), and the FCT projects Quan-tumMining POCI-01-0145-FEDER-031826, Predict PTDC/CCI-CIF/29877/2017 and QuantumPrime PTDC/EEI-TEL/8017/2020, supported by the European Regional Development Fund (FEDER), through the Competitiveness and Internationalization Operational Programme (COMPETE 2020) of the Portugal 2020 framework [Project Q.DOT with Nr. 039728 (POCI-01-0247-FEDER-039728)], and by the Regional Operational Program of Lis-
Publisher Copyright:
© 2022 Verein zur Forderung des Open Access Publizierens in den Quantenwissenschaften. All Rights Reserved.
PY - 2022/9/22
Y1 - 2022/9/22
N2 - Quantum key distribution, which allows two distant parties to share an unconditionally secure cryptographic key, promises to play an important role in the future of communication. For this reason such technique has attracted many theoretical and experimental efforts, thus becoming one of the most prominent quantum technologies of the last decades. The security of the key relies on quantum mechanics and therefore requires the users to be capable of performing quantum operations, such as state preparation or measurements in multiple bases. A natural question is whether and to what extent these requirements can be relaxed and the quantum capabilities of the users reduced. Here we demonstrate a novel quantum key distribution scheme, where users are fully classical. In our protocol, the quantum operations are performed by an untrusted third party acting as a server, which gives the users access to a superimposed single photon, and the key exchange is achieved via interaction-free measurements on the shared state. We also provide a full security proof of the protocol by computing the secret key rate in the realistic scenario of finite-resources, as well as practical experimental conditions of imperfect photon source and detectors. Our approach deepens the understanding of the fundamental principles underlying quantum key distribution and, at the same time, opens up new interesting possibilities for quantum cryptography networks.
AB - Quantum key distribution, which allows two distant parties to share an unconditionally secure cryptographic key, promises to play an important role in the future of communication. For this reason such technique has attracted many theoretical and experimental efforts, thus becoming one of the most prominent quantum technologies of the last decades. The security of the key relies on quantum mechanics and therefore requires the users to be capable of performing quantum operations, such as state preparation or measurements in multiple bases. A natural question is whether and to what extent these requirements can be relaxed and the quantum capabilities of the users reduced. Here we demonstrate a novel quantum key distribution scheme, where users are fully classical. In our protocol, the quantum operations are performed by an untrusted third party acting as a server, which gives the users access to a superimposed single photon, and the key exchange is achieved via interaction-free measurements on the shared state. We also provide a full security proof of the protocol by computing the secret key rate in the realistic scenario of finite-resources, as well as practical experimental conditions of imperfect photon source and detectors. Our approach deepens the understanding of the fundamental principles underlying quantum key distribution and, at the same time, opens up new interesting possibilities for quantum cryptography networks.
UR - http://www.scopus.com/inward/record.url?scp=85140646530&partnerID=8YFLogxK
U2 - 10.22331/Q-2022-09-22-819
DO - 10.22331/Q-2022-09-22-819
M3 - Article
AN - SCOPUS:85140646530
SN - 2521-327X
VL - 6
JO - Quantum
JF - Quantum
M1 - 819
ER -