This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Device-Independent Quantum Key Distribution
Based on the Mermin-Peres Magic Square Game

Yi-Zheng Zhen Hefei National Research Center for Physical Sciences at the Microscale and School of Physical Sciences, University of Science and Technology of China, Hefei 230026, China Shanghai Research Center for Quantum Science and CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai 201315, China    Yingqiu Mao Hefei National Research Center for Physical Sciences at the Microscale and School of Physical Sciences, University of Science and Technology of China, Hefei 230026, China Shanghai Research Center for Quantum Science and CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai 201315, China    Yu-Zhe Zhang Hefei National Research Center for Physical Sciences at the Microscale and School of Physical Sciences, University of Science and Technology of China, Hefei 230026, China Shanghai Research Center for Quantum Science and CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai 201315, China    Feihu Xu [email protected] Hefei National Research Center for Physical Sciences at the Microscale and School of Physical Sciences, University of Science and Technology of China, Hefei 230026, China Shanghai Research Center for Quantum Science and CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai 201315, China Hefei National Laboratory, University of Science and Technology of China, Hefei 230088, China    Barry C. Sanders [email protected] Hefei National Research Center for Physical Sciences at the Microscale and School of Physical Sciences, University of Science and Technology of China, Hefei 230026, China Shanghai Research Center for Quantum Science and CAS Center for Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Shanghai 201315, China Institute for Quantum Science and Technology, University of Calgary, Alberta T2N 1N4, Canada
Abstract

Device-independent quantum key distribution (DIQKD) is information-theoretically secure against adversaries who possess a scalable quantum computer and who have supplied malicious key-establishment systems; however, the DIQKD key rate is currently too low. Consequently, we devise a DIQKD scheme based on the quantum nonlocal Mermin-Peres magic square game: our scheme asymptotically delivers DIQKD against collective attacks, even with noise. Our scheme outperforms DIQKD using the Clauser-Horne-Shimony-Holt game with respect to the number of game rounds, albeit not number of entangled pairs, provided that both state visibility and detection efficiency are high enough.

Device-independent quantum key distribution (DIQKD) enables distant parties to achieve quantum key distribution even with untrusted apparatuses [1, 2, 3]. DIQKD provides information-theoretic security [4, 5, 6] against certain side-channel attacks that compromise the security of conventional quantum key distribution implementations [7, 8, 9]. To achieve this security, DIQKD treats all devices that prepare, transmit, and measure information carriers as black boxes that could have been created by an adversary. A nonlocality test [10] is typically executed by two communicating parties to estimate an adversary’s possible knowledge about the generated data. Based on the result of the test, the parties determine whether the data suffice to yield secure keys [4, 5, 6].

However, as a sacrifice for high-level security, DIQKD yields a low key rate, as confirmed by recent experimental demonstrations [11, 12, 13]. For the potential use of DIQKD in practice, a high key-rate DIQKD protocol is demanding. Here, we remedy this issue by employing the nonlocality test of a Mermin-Peres magic square game (MPG) [14, 15] in DIQKD. The MPG is a special nonlocal game whose quantum strategies allow two players to win with unit probability [16, 17], thereby exceeding the winning probability of other nonlocal games such as the Clauser-Horne-Shimony-Holt (CHSH) game [18]. These remarkable features enable the MPG to yield a distinct DIQKD protocol from conventional protocols [19, 20, 21, 22, 23, 24].

Here, we propose a DIQKD protocol based on the MPG and prove security in the asymptotic case subject to collective attacks. Adopting the technique proposed in Ref. [25], we numerically determine thresholds for state visibility and detection efficiency required by the protocol to generate secure keys. We show that our MPG-based protocol generates a higher key rate, defined as the average number of secret bits generated in each instance of the protocol (namely, preparation, distribution, and measurement), compared to CHSH-based DIQKD protocols for certain parameter regimes. Precisely, we show that our MPG-based protocol demonstrates advantages if the state visibility exceeds 0.978 (with perfect detection) or if the detection efficiency exceeds 0.982 (with a perfect source). Our results show the potential advantage of using more complex entangled states in implementing DIQKD.

MPG-based DIQKD protocol.—Alice and Bob play the MPG [14, 15, 16], which is depicted and explained in Fig. 1.

Refer to caption
Figure 1: The Mermin-Peres magic square game. Two players, Alice and Bob, fill a 3×33\times 3 magic square over many rounds for both of them to win. In each round, a referee generates two random “trits” x,y{0,1,2}x,y\in\{0,1,2\} and sends row index xx to Alice and column index yy to Bob. Alice and Bob then reply to the referee with a row [a0x,a1x,a2x][a^{x}_{0},a^{x}_{1},a^{x}_{2}] and a column [b0y,b1y,b2y]T[b^{y}_{0},b^{y}_{1},b^{y}_{2}]^{\textsf{T}}, respectively, where all aix,bjya^{x}_{i},b^{y}_{j} for i,j{0,1,2}i,j\in\{0,1,2\} are bits that satisfy iaix=0\oplus_{i}a^{x}_{i}=0 and jbjy=1\oplus_{j}b^{y}_{j}=1. The winning condition is that Alice and Bob share the same value for the overlapped grid, i.e., ai=yx=bj=xya^{x}_{i=y}=b^{y}_{j=x}. During the game, Alice and Bob are forbidden to communicate with each other.

After the game, the referee decides whether Alice and Bob win or not according to the average winning probability

ω=x,yπ(x,y)P(ayx=bxy|x,y).\omega=\sum_{x,y}\pi\left(x,y\right)P\left(a_{y}^{x}=b_{x}^{y}|x,y\right). (1)

Here, π(x,y)\pi(x,y) is the probability of distributing index pair (x,y)(x,y), and P(ayx=bxy|x,y)P(a_{y}^{x}=b_{x}^{y}|x,y) is the winning probability of Alice and Bob with respect to (x,y)(x,y).

Throughout, we employ the unbiased MPG: π(x,y)=1/9\pi(x,y)=\nicefrac{{1}}{{9}}. When using classical strategies (see one example in §IA of Supplemental Material 111See Supplemental Material for the classical and quantum strategies for the MPG, the security of MPG-based protocol beyond the ideal case, and the CHSH-based DIQKD protocols.), Alice and Bob’s average winning probability is at most 8/9\nicefrac{{8}}{{9}} [27, 17]. As classical strategies are equivalent to local hidden variables, ω8/9\omega\leqslant\nicefrac{{8}}{{9}} is actually a Bell inequality; some quantum strategies violate this inequality [27, 17]. Here, we denote a quantum strategy as (ρ,)(\rho,{\cal M}) and its average winning probability as ω(ρ,)\omega(\rho,{\cal M}), where ρ\rho is the distributed quantum state and {\cal M} is the set of Alice’s and Bob’s quantum measurements used to generate the outputs. In particular, when the state is two pairs of maximally entangled qubits

Ψ2=ΨA1B1+ΨA2B2+,Ψ+|00+1100+11|2,\Psi_{2}=\Psi_{\text{A}_{1}\text{B}_{1}}^{+}\otimes\Psi_{\text{A}_{2}\text{B}_{2}}^{+},\quad\Psi^{+}\coloneqq\frac{\Ket{00+11}\Bra{00+11}}{2}, (2)

a measurement set opt{\cal M}_{\text{opt}} (details in §IB of Supplemental Material [26]) exists such that Alice and Bob will win the MPG: ω(Ψ2,opt)=1\omega(\Psi_{2},{\cal M}_{\text{opt}})=1 with optimal quantum strategy (Ψ2,opt)(\Psi_{2},{\cal M}_{\text{opt}}).

Crucially, the MPG certifies whether the outputs are correlated in every input pair. This feature allows us to design a DIQKD protocol, as introduced in Protocol 1. In this protocol, two communication parties, also termed Alice and Bob, initially generate data by playing the MPG. They announce their inputs and record the overlapped bits. To estimate parameters, Alice communicates with Bob which part of the bits serves as raw keys with the remaining part of the bits announced to play the MPG. If the average winning probability estimated from the announced data is less than an expected value ωexp\omega_{\text{exp}}, they abort the protocol; otherwise, they perform data reconciliation on raw keys to obtain the final keys.

Input

NN—number of rounds,

ωexp\omega_{\text{exp}}—expected winning probability of the MPG.
  • Output

    𝑲A\boldsymbol{K}_{\text{A}}—Alice’s final key, 𝑲B\boldsymbol{K}_{\text{B}}—Bob’s final key.

    Data generation

    In each round n[N]={1,,N}n\in[N]=\{1,\dots,N\}, Alice and Bob independently pick xn,yn{0,1,2}x_{n},y_{n}\in\{0,1,2\}, uniformly at random. They inject xnx_{n} and yny_{n} to their devices and record the outputs [a0xn,a1xn,a2xn=a0xna1xn][a^{x_{n}}_{0},a^{x_{n}}_{1},a^{x_{n}}_{2}=a^{x_{n}}_{0}\oplus a^{x_{n}}_{1}] for Alice and [b0yn,b1yn,b2yn=b0ynb1yn1][b^{y_{n}}_{0},b^{y_{n}}_{1},b^{y_{n}}_{2}=b^{y_{n}}_{0}\oplus b^{y_{n}}_{1}\oplus 1] for Bob, respectively.

    Announcement

    Alice and Bob announce their inputs {xn}\{x_{n}\} and {yn}\{y_{n}\}. They keep the bits {aynxn}\{a^{x_{n}}_{y_{n}}\} and {bxnyn}\{b^{y_{n}}_{x_{n}}\}, respectively.

    Parameter estimation

    Alice picks a random index subset [K][N][K]\subsetneq[N] with a length γN\gamma N and communicates [K][K] with Bob. They use the bits with indexes in [K][K] as raw keys 𝑨\boldsymbol{A} and 𝑩\boldsymbol{B}, respectively, and announce the remaining bits, based on which they estimate the average winning probability ω\omega of the MPG. If ω<ωexp\omega<\omega_{\text{exp}}, they abort the protocol; otherwise, they proceed.

    Data reconciliation

    Alice and Bob apply error correction and privacy amplification on the raw keys 𝑨\boldsymbol{A} and 𝑩\boldsymbol{B} to obtain final secure keys 𝑲A\boldsymbol{K}_{\text{A}} and 𝑲B\boldsymbol{K}_{\text{B}}, respectively.

  • Protocol 1 The MPG-based DIQKD protocol

    Security analysis.—To prove security for a DIQKD protocol, one needs to consider general adversary attacks and finite-data effect [4, 5, 6]. On the other hand, one can also temporarily consider weak security where adversary attacks are independent identically distributed (i.i.d.) collective and where the number of rounds NN is infinite (asymptotic scenario), followed by extending the weak security to the general scenario [6, 28, 29]. Here, we analyze the weak security of Protocol 1.

    Suppose that an MPG-based DIQKD protocol with a pre-determined ωexp\omega_{\text{exp}} is successfully implemented. We analyze if and how much secure key can be established for the case of i.i.d. collective attacks in the asymptotic scenario. Because DIQKD assumes the correctness and completeness of quantum theory, data generated in the protocol can be described by quantum measurements on a quantum state. As all quantum devices are untrusted, the precise quantum state and quantum measurements are unknown. Nevertheless, the assumption of i.i.d. collective attacks allows one to suppose that [19], in each round, the adversary Eve produces a quantum state ψABE\psi_{\text{ABE}} [19, 6] and distributes it to Alice and Bob.

    Measurements in the protocol, without losing generality, can always be described by the sets of projector-valued measures {Ma0a1x}x\set{M_{a_{0}a_{1}}^{x}}_{x} for Alice and {Nb0b1y}y\set{N_{b_{0}b_{1}}^{y}}_{y} for Bob, respectively. Here, xx and yy denote the inputs (i.e., measurement settings) while a0a1a_{0}a_{1} and b0b1b_{0}b_{1} are bits representing Alice’s and Bob’s outputs,

    [a0x,a1x,a2x=a0xa1x],[b0y,b1y,b2y=b0yb1y1]T,[a^{x}_{0},a^{x}_{1},a^{x}_{2}=a^{x}_{0}\oplus a^{x}_{1}],\,[b^{y}_{0},b^{y}_{1},b^{y}_{2}=b^{y}_{0}\oplus b^{y}_{1}\oplus 1]^{\textsf{T}}, (3)

    respectively. For

    ρtrE[ψABE],{{Ma0a1x}x,{Nb0b1y}y},\rho\coloneqq\text{tr}_{\text{E}}[\psi_{\text{ABE}}],\,{\cal M}\coloneqq\Set{\{M_{a_{0}a_{1}}^{x}\}_{x},\{N_{b_{0}b_{1}}^{y}\}_{y}}, (4)

    (ρ,)(\rho,{\cal M}) is evidently a quantum strategy for the MPG. The only constraint on (ρ,)(\rho,{\cal M}) is that the protocol is not aborted; i.e., ω(ρ,)ωexp\omega(\rho,{\cal M})\geqslant\omega_{\text{exp}}.

    An essential feature of the protocol is that raw keys are generated by all (x,y)(x,y) pairs of quantum measurements in {\cal M} on the state ψABE\psi_{\text{ABE}}. For each input pair (x,y)(x,y), whatever the precise forms of {Ma0b1x}\{M_{a_{0}b_{1}}^{x}\} and {Nb0b1y}\{N_{b_{0}b_{1}}^{y}\} are, the quantum state after the measurement can always be expressed as a classical-classical-quantum state.

    τxy:=ayx,bxy|ayxayx|A|bxybxy|Bϕ^E(ayxbxy),\tau_{xy}:=\sum_{a^{x}_{y},b^{y}_{x}}\Ket{a^{x}_{y}}\Bra{a^{x}_{y}}_{\text{A}}\otimes\Ket{b^{y}_{x}}\Bra{b^{y}_{x}}_{\text{B}}\otimes\hat{\phi}_{\text{E}}\left(a^{x}_{y}b^{y}_{x}\right), (5)

    where ayx,bxya^{x}_{y},b^{y}_{x} are the raw keys (bits from the overlapping grid of Alice’s row and Bob’s column) and ϕ^E(ayxbxy)\hat{\phi}_{\text{E}}\left(a^{x}_{y}b^{y}_{x}\right) is the unnormalized quantum state characterizing Eve’s knowledge of the raw keys.

    An appropriate one-way data-reconciliation protocol always exists such that a certain amount of secure keys can be processed from the raw keys while eliminating Eve’s information [30]. As a result, for each input pair (x,y)(x,y), at least a ratio min{0,r(τxy)}\min\{0,r(\tau_{xy})\} of the raw keys will remain as final keys, where

    r(τxy)H(𝑨|E)τxyH(𝑨|𝑩)τxy.r\left(\tau_{xy}\right)\coloneqq H(\boldsymbol{A}|E)_{\tau_{xy}}-H(\boldsymbol{A}|\boldsymbol{B})_{\tau_{xy}}. (6)

    Here, H(|)H(~{}|~{}) denotes the conditional von Neumann entropy, and the bold symbols 𝑨\boldsymbol{A} and 𝑩\boldsymbol{B} imply that Alice and Bob’s states are in classical states, representing the raw keys 𝑨\boldsymbol{A} and 𝑩\boldsymbol{B}, respectively.

    Finally, the security of the protocol should take all possible ψABE\psi_{\text{ABE}} into account, which implies that the final keys correspond to the worst case of all quantum strategies (ρ,)(\rho,{\cal M}). We define the key rate of DIQKD as the ratio of the length of final keys and the number of all rounds. In the asymptotic limit NN\to\infty, the key rate can be expressed as

    R=min{0,γ9inf(ρ,)xyr(τxy)},R=\min\Set{0,\frac{\gamma}{9}\inf_{\left(\rho,{\cal M}\right)}\sum_{xy}r\left(\tau_{xy}\right)}, (7)

    subject to

    ω(ρ,)ωexp.\omega\left(\rho,{\cal M}\right)\geqslant\omega_{\text{exp}}. (8)

    Here, the coefficient γ/9\nicefrac{{\gamma}}{{9}} comes from the fact that each input pair (x,y)(x,y) occurs with a probability 1/9\nicefrac{{1}}{{9}} while a ratio γ\gamma of the rounds is used as raw keys. The key rate defined here characterizes how many secure keys can be generated given the number of experimental rounds, which is different from the definition used in some literature where the test rounds are excluded [24].

    To further prove that the protocol can produce correct and secure keys, we need to show that the key rate RR has positive values when implementing the protocol using certain quantum strategies. We first consider an ideal case, namely, implementing the protocol with the optimal quantum strategy (Ψ2,opt)(\Psi_{2},{\cal M}_{\text{opt}}) and setting ωexp=1\omega_{\text{exp}}=1. As the inputs are unbiased and randomly picked, the test rounds and the key rounds have the same correlations, both of which yield ω=1\omega=1, so the protocol will not be aborted. Meanwhile, Alice and Bob’s raw keys are uniformly distributed and perfectly correlated (see details in §IB of Supplemental Material [26]). We have H(𝑨|𝑩)τxy=0H(\boldsymbol{A}|\boldsymbol{B})_{\tau_{xy}}=0 for any (x,y)(x,y). Furthermore, ω=1\omega=1 in the MPG can self-test two singlets [31]; i.e., the unknown quantum state must be locally isometric to two pairs of maximally entangled 2-qubit states. Such states cannot be correlated with a third party because of entanglement monogamy [32]. Combining with the fact that 𝑨\boldsymbol{A} is uniformly random for all τxy\tau_{xy}, we have H(𝑨|E)τxy=1H(\boldsymbol{A}|E)_{\tau_{xy}}=1, indicating that the adversary has no information on 𝑨\boldsymbol{A}. As a result, we obtain R=γR=\gamma for this ideal case, which shows that the protocol can indeed produce secure keys.

    For non-ideal cases when general quantum strategies are adopted or when noises are involved, we can bound RR via the recently developed technique of quasi-relative entropy [25]. Precisely, a lower bound for H(𝑨|E)τxyH(\boldsymbol{A}|E)_{\tau_{xy}} in Eq. (6) can be derived as [25]

    H(𝑨|E)τxycm+k=1m1ckminψ|Gk(x,y)|ψ,H\left(\boldsymbol{A}|E\right)_{\tau_{xy}}\geqslant c_{m}+\sum_{k=1}^{m-1}c_{k}\min\braket{\psi}{G_{k}\left(x,y\right)}{\psi}, (9)

    where cm=k=1m1ckc_{m}=\sum_{k=1}^{m-1}c_{k} and ck=wk/(tkln2)c_{k}=w_{k}/(t_{k}\ln 2), with {(tk,wk)|k=1,,m}\{(t_{k},w_{k})|k=1,\dots,m\} a set of mm nodes and weights of the Gauss-Radau quadrature, and Gk(x,y)G_{k}(x,y) is defined as

    Gk(x,y)\displaystyle G_{k}\left(x,y\right) ay{0,1}{Πayx[Zay+Zay+(1tk)ZayZay]\displaystyle\coloneqq\sum_{a_{y}\in\left\{0,1\right\}}\left\{\Pi_{a_{y}}^{x}\left[Z_{a_{y}}+Z_{a_{y}}^{\dagger}+\left(1-t_{k}\right)Z_{a_{y}}^{\dagger}Z_{a_{y}}\right]\right.
    +tkZayZay},\displaystyle\hskip 56.9055pt\left.+t_{k}Z_{a_{y}}Z_{a_{y}}^{\dagger}\right\}, (10)

    with ZayZ_{a_{y}} an arbitrary operator and Πayx\Pi_{a_{y}}^{x} the projector-valued measure corresponding to Alice’s input xx and output ayxa^{x}_{y}. Combining with Eqs. (7) and (8), the minimization in Eq. (9) is taken over all possible pure states |ψ=|ψABE\ket{\psi}=\ket{\psi}_{\text{ABE}} and measurement strategies ={{Ma0a1x}x,{Nb0b1y}y}{\cal M}=\set{\{M_{a_{0}a_{1}}^{x}\}_{x},\{N_{b_{0}b_{1}}^{y}\}_{y}} subject to

    ω(ρ,)\displaystyle\omega\left(\rho,{\cal M}\right) ωexp,ρ=trE[|ψψ|ABE],\displaystyle\geqslant\omega_{\text{exp}},\quad\rho=\text{tr}_{\text{E}}\left[\ket{\psi}\bra{\psi}_{\text{ABE}}\right], (11a)
    Πay=0x\displaystyle\Pi_{a_{y}=0}^{x} ={M00x+M01xif y=0M00x+M10xif y=1M00x+M11xif y=2,\displaystyle=\begin{cases}M_{00}^{x}+M_{01}^{x}&\text{if }y=0\\ M_{00}^{x}+M_{10}^{x}&\text{if }y=1\\ M_{00}^{x}+M_{11}^{x}&\text{if }y=2\end{cases}, (11b)
    Πay=1x\displaystyle\Pi_{a_{y}=1}^{x} =𝟙Πay=0x,\displaystyle=\mathds{1}-\Pi_{a_{y}=0}^{x}, (11c)
    0\displaystyle 0 =[Ma0a1x,Nb0b1y],\displaystyle=\left[M_{a_{0}a_{1}}^{x^{\prime}},N_{b_{0}b_{1}}^{y^{\prime}}\right], (11d)
    0\displaystyle 0 =[Ma0a1x,Zay]=[Zay,Nb0b1y],\displaystyle=\left[M_{a_{0}a_{1}}^{x^{\prime}},Z_{a_{y}}\right]=\left[Z_{a_{y}},N_{b_{0}b_{1}}^{y^{\prime}}\right], (11e)
    a0,1,y,b0,1{0,1},x,y{0,1,2}.\displaystyle\quad\forall a_{0,1,y},b_{0,1}\in\{0,1\},\forall x^{\prime},y^{\prime}\in\{0,1,2\}. (11f)

    This constrained minimization can be resolved via the Navascués-Pironio-Acín (NPA) hierarchy [33], which is numerically computable via solving a semidefinite program 222The 𝖯𝖸𝖳𝖧𝖮𝖭\mathsf{PYTHON} code for obtaining the key-rate bound can be found in https://github.com/YizhengZhen/Code_DIQKD_MPG. In §II of Supplemental Material [26], we numerically show that H(𝑨|E)τxyH(\boldsymbol{A}|E)_{\tau_{xy}} has a positive lower bound if ωexp>0.9575\omega_{\text{exp}}>0.9575, which implies that the protocol can produce secure keys if, in the end, Eq. (7) has a positive value.

    Noise tolerance.—Consider the case where the optimal quantum strategy (Ψ2,opt)(\Psi_{2},{\cal M}_{\text{opt}}) is supposed to be used to implement the MPG-based protocol. Here, we characterize the performance of the protocol under two types of noise. For the first type, we consider the imprecise preparation of Ψ2\Psi_{2} such that each qubit may be mixed with some white noise. The distributed state becomes ρνρν\rho_{\nu}\otimes\rho_{\nu} before the detection, where ρν=νΨ++(1ν)𝟙/2\rho_{\nu}=\nu\Psi^{+}+(1-\nu)\mathds{1}/2 and ν\nu is the state visibility. For the second type, we consider the noise led by non-click events in measurements. Such non-click events are caused by the loss of the state in transmission or the inefficiency of the detector, and cannot be sifted out from the data (otherwise, it may open detection loopholes [10, 11, 12, 13]). Instead, Alice and Bob must assign an output to the non-click events. We consider the following procedure: in each round, unless Alice (or Bob) successfully measured her (or his) state, Alice (or Bob) will output values according to a deterministic strategy of the MPG (Table I in §IA of Supplemental Material [26]). The detection efficiency on each side is assumed identical and denoted as η\eta.

    We consider two cases where only the white noise is involved and where only the detection inefficiency is involved. For each value of ν\nu or η\eta, we select ωexp\omega_{\text{exp}} such that the produced data can pass the parameter estimation in the protocol. The results are shown in Fig. 2. In the figure, the red solid line is the key-rate lower bound of the MPG-based protocol, which is obtained by solving the semidefinite programming problem combining Eqs. (6)-(11). For the calculation, we set the NPA hierarchy as 2 and the number of nodes in the Gauss-Radau quadrature as 16. From the figure, we observe that the key rate decreases when the state visibility or detection efficiency becomes smaller. It shows that the MPG-based protocol can produce a positive key rate if the state visibility ν>0.959\nu>0.959 or if the detection efficiency η>0.969\eta>0.969.

    Refer to caption
    Figure 2: Noise tolerance of the MPG-based protocol (red solid line) against the state visibility ν\nu (left) and the detection efficiency η\eta (right). Results of the CHSH-based protocols are plotted as blue dashed lines for comparison. ε\varepsilon represents the probability of Alice picking x=1x=1 in CHSH-based protocols.

    Overcoming the key rate of CHSH-based protocols.—A prominent feature of the MPG-based protocol is that outputs of every input pair can be used to generate secure keys. As a result, all the outputs except that used in the estimation are collected as raw keys. This feature may enable the MPG-based protocol to yield a higher key rate than conventional DIQKD protocols. Particularly, if the optimal quantum strategy of the MPG can be faithfully implemented, the key rate Ropt=γR_{\text{opt}}=\gamma. It is actually the maximal key rate that any DIQKD protocol can achieve. As we will show, the MPG-based protocol outperforms a variety of CHSH-based protocols for certain regions of noise parameters.

    In a standard CHSH-based protocol [20, 19], Alice and Bob usually have inputs x{0,1}x\in\{0,1\} and y{0,1,2}y\in\{0,1,2\}, respectively. To generate the data, Alice picks xx uniformly at random while Bob picks y{0,1,2}y\in\{0,1,2\} according to probabilities (1γ)/2,(1γ)/2,γ(1-\gamma)/2,(1-\gamma)/2,\gamma, respectively, and they input xx and yy into their local device and record the outputs a,b{0,1}a,b\in\{0,1\}. After obtaining all the data, they announce the inputs and select the outputs corresponding to the input pair (x,y){0,1}2(x,y)\in\{0,1\}^{2} to play the CHSH game. If the average winning probability is above a certain threshold, they select the outputs corresponding to the input pair (x,y)=(0,2)(x,y)=(0,2) as the raw keys, followed by the data-reconciliation procedure to obtain the final keys. One can immediately see that the key rate cannot exceed γ/2\gamma/2, which is half of the optimal key rate of the MPG-based protocol.

    To make a full comparison between the MPG-based protocol and protocols based on the CHSH game, we consider a variety of protocols based on biased CHSH games [35]. Suppose that in the CHSH-based protocol, Alice picks x=0,1x=0,1 according to probabilities 1ε,ε1-\varepsilon,\varepsilon, respectively, while Bob’s probabilities of picking yy remain the same. Then, the optimal key rate of the protocol becomes γ(1ε)/2\gamma(1-\varepsilon)/2, which is higher than that of the standard CHSH-based protocol and is approaching γ\gamma when ε0\varepsilon\rightarrow 0. We provide the details of the biased CHSH game and its induced DIQKD protocols in §IIIA of Supplemental Material [26].

    We compare the performance of MPG-based protocol and CHSH-based protocols with different input probabilities. We suppose that the optimal quantum strategy for the biased CHSH game is used to implement the CHSH-based protocol [35, 36]. It turns out that when introducing the white noise, it is equivalent to treating the distributed state as ρν\rho_{\nu}. When a non-click event occurs, Alice (or Bob) will output 0 for any input xx (or yy) such that a deterministic classical strategy is equivalently selected.

    The results are shown again in Fig. 2, where the key-rate lower bounds of the CHSH-based protocols with different ε\varepsilons are plotted with blue dashed lines. These key-rate lower bounds are obtained in a similar fashion to calculating the key-rate lower bound for the MPG-based protocol, as presented in §IIIB of Supplemental Material [26]. We observe that all key rates decrease when state visibility or detection efficiency decreases. As expected, decreasing ε\varepsilon can increase the optimal key rate of CHSH-based protocols. Nevertheless, these protocols cannot exceed the key rate of the MPG-based protocol in regions of ν>0.978\nu>0.978 and η>0.982\eta>0.982, showing the advantage of the MPG-based protocol in these regions.

    Discussion.—We have shown that our MPG-based protocol generates more secret keys per instance of protocol than CHSH-based protocols, in regions where the state visibility and detection efficiency are high. This comparison is made on the basis that the costly resource is the number of nonlocal games executed in the experiment [23, 24]. Indeed, the secrecy of the keys in DIQKD is guaranteed by winning nonlocal games. Therefore, our result implies that a more complex nonlocal game may lead to a higher amount of secure keys per game round.

    Nevertheless, the number of nonlocal games does not necessarily equal to the number of entangled states generated by the source, which is usually the considered resource in practice. In the case where the source generates a certain number of 2-qubit entangled states, the CHSH-based protocol is preferred. This is because the CHSH-based protocol can run twice as many rounds as that of a MPG-based protocol, and more keys could be produced. Also, the CHSH-based protocol is more robust against diminished state visibility and detection efficiency.

    As for the realization of Protocol 1, the resource state Ψ2\Psi_{2} can be produced using two identical preparation of entangled singlets, or using the hyper-entanglement technique to reduce the experimental overheads [37, 38, 39]. An obvious downside of the protocol is its high requirements for state visibility and detection efficiency. The selection of platforms is important to fulfill the desired requirements. For instance, the platform with remote matter-qubit entanglement can provide a higher detection efficiency. Meanwhile, theoretical improvements, including the use of on-maximally entangled states [21, 22], noisy-preprocessing procedures [40], and post-selection techniques [41], can be considered to reduce the requirements of the protocol on the experimental imperfections.

    In addition, regarding the higher key rate of the MPG-based protocol over CHSH-based protocols, one may wonder if there are improvements on the CHSH-based protocol such that the key rate γ\gamma can be achieved. For instance, in the standard CHSH-based protocol, one can add a key-generation agreement after the state distribution but before the measurements. Such step allows Alice and Bob to do either key generation or CHSH test [i.e., the original rounds corresponding to (x,y)=(1,2)(x,y)=(1,2) do not exist], which theoretically enables the key rate to be as high as γ\gamma. However, the security of the modified protocol requires an additional assumption that no unwanted information is leaked during the key-generation agreement step 333Otherwise, the untrusted devices may communicate with the adversary in the agreement step of each round. We remark that the MPG-based protocol can achieve a key rate as high as γ\gamma without relying on the above additional assumption.

    Conclusions.—We have proposed the DIQKD protocol based on the MPG and have provided the security analysis of the protocol against the collective attacks in the asymptotic scenario. We have numerically characterized the regions of two noise parameters, namely, state visibility and detection efficiency, when the MPG-based protocol can produce secure keys. We have further shown that, in certain regions, the MPG-based protocol has a higher key rate over a variety of protocols based on CHSH games. Our result shows the advantage of a sophisticated nonlocal game in DIQKD protocols and the potential usage of high-dimensional entanglement in device-independent quantum information tasks.

    Acknowledgements.
    We gratefully acknowledge valuable discussions with Nai-Le Liu, Kai Chen, Li Li, and Valerio Scarani. We also thank Enrique Cervero Martín and Marco Tomamichel for pointing out errors in a previous version of this paper and for drawing our attention to related works [43, 44, 45], which we had not known. This work was supported by National Natural Science Foundation of China (No. 62031024, No. 12005091, No. 12104444), National Key Research and Development Program of China (No. 2020YFA0309700), Shanghai Academic/Technology Research Leader (No. 21XD1403800), and Shanghai Science and Technology Development Funds (No. 22JC1402900). Y.M. acknowledges support from the China Postdoctoral Science Foundation (Grant No. 2021M693093). F.X. acknowledges the support from the Tencent Foundation.

    References