Recognition: unknown
Device-independent quantum cryptography with input leakage
Pith reviewed 2026-05-09 23:50 UTC · model grok-4.3
The pith
Device-independent protocols can certify local randomness and extract secret keys even with partial input leakage by modeling it as an independent noisy channel.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
In CHSH-based device-independent randomness certification and key distribution, when input leakage is modeled as an independent noisy channel, the certifiable local randomness and the secret key rate can both be expressed as explicit decreasing functions of the leakage magnitude, remaining strictly positive below well-defined thresholds determined by the observed CHSH violation.
What carries the argument
Modeling input leakage as a noisy channel independent of the quantum correlations, allowing its magnitude to be quantified separately from the CHSH violation to bound randomness and key rates.
Load-bearing premise
The input leakage can be faithfully modeled as a noisy channel whose effect is independent of the quantum correlations and can be quantified separately from the CHSH violation.
What would settle it
An experiment that controls the magnitude of input leakage in a CHSH test, measures the observed violation and leakage level, and checks whether the certified randomness or key rate matches the predicted functional dependence on leakage.
Figures
read the original abstract
Device-independence is the gold standard of quantum cryptography. To meet this standard, a central assumption is that no information leakage occurs during protocol execution. We relax this assumption by analyzing CHSH-based randomness certification and key distribution with partial leakage of the inputs, modeled in terms of a noisy channel. Our results quantify the certifiable local randomness and the secret key rate as a function of the magnitude of the input leakage.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript analyzes CHSH-based device-independent randomness certification and quantum key distribution, relaxing the no-leakage assumption by modeling partial input leakage as a classical noisy channel whose effect is independent of the underlying quantum correlations. It derives explicit expressions for the certifiable local randomness and the achievable secret key rate as functions of the leakage magnitude parameter.
Significance. If the modeling separation holds, the work provides concrete, usable bounds that quantify the degradation in DI security guarantees due to realistic input leakage. This is relevant for bridging theoretical DI protocols with experimental implementations where perfect input isolation cannot be guaranteed, and the functional dependence on leakage magnitude allows direct assessment of protocol viability.
major comments (2)
- [§2 (Leakage model)] §2 (Leakage model): The central modeling choice treats the input leakage as a noisy channel whose statistics are independent of the quantum state and the specific measurement outcomes, allowing separate quantification from the observed CHSH violation. This independence is load-bearing for all subsequent bounds; an adversary able to correlate the effective channel with hidden variables or the quantum system would invalidate the separation, and the manuscript does not provide a rigorous argument or worst-case bound against such correlation.
- [§4 (Randomness and key-rate derivations)] §4 (Randomness and key-rate derivations): The expressions for certifiable local randomness and secret key rate are given as functions of the leakage magnitude, but the derivations rely on the channel independence without an accompanying error analysis or sensitivity check showing how small violations of independence affect the final quantities. This makes it difficult to assess robustness of the claimed quantifications.
minor comments (2)
- [Abstract] The abstract and introduction would benefit from a short explicit statement of the CHSH inequality and the standard no-leakage assumption being relaxed.
- Notation for the leakage magnitude parameter is introduced without a dedicated table or summary of its allowed range (0 to 1); adding this would improve readability.
Simulated Author's Rebuttal
We thank the referee for the careful reading of our manuscript and the constructive comments. We address the two major comments point by point below, indicating the changes made in the revised version.
read point-by-point responses
-
Referee: §2 (Leakage model): The central modeling choice treats the input leakage as a noisy channel whose statistics are independent of the quantum state and the specific measurement outcomes, allowing separate quantification from the observed CHSH violation. This independence is load-bearing for all subsequent bounds; an adversary able to correlate the effective channel with hidden variables or the quantum system would invalidate the separation, and the manuscript does not provide a rigorous argument or worst-case bound against such correlation.
Authors: We thank the referee for this observation. The independence of the leakage channel from the quantum state and measurement outcomes is an explicit modeling assumption introduced in Section 2 to permit a clean separation between classical input leakage and the device-independent quantum correlations. This choice allows us to derive closed-form expressions for the certified quantities as functions of the leakage parameter. We agree that an adversary capable of introducing correlations between the leakage channel and the hidden variables (or the quantum system) would require a different, more complex analysis that could alter the bounds. The manuscript does not claim to cover this stronger adversarial setting. In the revised manuscript we have expanded the discussion in Section 2 to state the modeling assumption more explicitly, to delineate its scope, and to identify correlated leakage as an open direction for future investigation. revision: partial
-
Referee: §4 (Randomness and key-rate derivations): The expressions for certifiable local randomness and secret key rate are given as functions of the leakage magnitude, but the derivations rely on the channel independence without an accompanying error analysis or sensitivity check showing how small violations of independence affect the final quantities. This makes it difficult to assess robustness of the claimed quantifications.
Authors: The expressions derived in Section 4 are exact under the independence assumption stated in the model. We acknowledge that an explicit sensitivity analysis would help readers gauge robustness against small departures from independence. In the revised manuscript we have added a short subsection in Section 4 that provides a first-order robustness argument: using the continuity of the relevant conditional von Neumann entropies with respect to the channel parameters, we show that the certified local randomness and secret-key rate change continuously when the independence assumption is mildly violated. This addition supplies a quantitative indication of sensitivity without altering the main closed-form results. revision: yes
Circularity Check
No significant circularity; derivation treats leakage magnitude as external input parameter
full rationale
The paper derives certifiable local randomness and secret key rate explicitly as functions of an externally quantified leakage magnitude under a modeled noisy channel. No self-definitional loops, fitted inputs renamed as predictions, or load-bearing self-citations appear in the provided abstract and reader's summary. The central results are expressed in terms of the leakage parameter rather than reducing to it by construction, and the modeling assumption (channel independence) is stated separately from the CHSH-based quantification. This is a standard self-contained functional derivation against external benchmarks, consistent with score 0-2.
Axiom & Free-Parameter Ledger
free parameters (1)
- leakage magnitude
axioms (2)
- standard math CHSH inequality provides the basis for device-independent certification of randomness and keys.
- domain assumption Input leakage can be modeled as a noisy channel whose statistics are independent of the quantum state and measurement outcomes.
Reference graph
Works this paper leans on
-
[1]
Z., Thinh, L
Law, Y. Z., Thinh, L. P., Bancal, J. D. & Scarani, V. Quantum randomness extraction for various levels of characterization of the devices.Journal of Physics A: 8 Mathematical and Theoretical47, 424028 (2014)
2014
-
[2]
S.Speakable and Unspeakable in Quantum Me- chanics: Collected Papers on Quantum Philosophy
Bell, J. S.Speakable and Unspeakable in Quantum Me- chanics: Collected Papers on Quantum Philosophy. Cam- bridge University Press (2004)
2004
-
[3]
Bell nonlocality.Reviews of Modern Physics 86, 419-478 (2014)
Brunner, N., Cavalcanti, D., Pironio, S., Scarani, V., & Wehner, S. Bell nonlocality.Reviews of Modern Physics 86, 419-478 (2014)
2014
-
[4]
Oxford University Press (2019)
Scarani, V.Bell nonlocality. Oxford University Press (2019)
2019
-
[5]
B., Matsukevich, D
Pironio, S., Ac´ ın, A., Massar, S., de La Giroday, A. B., Matsukevich, D. N., Maunz, P.et al. Random num- bers certified by Bell’s theorem.Nature464, 1021-1024 (2010)
2010
-
[6]
& Renner, R
Colbeck, R. & Renner, R. Free randomness can be am- plified.Nature Physics8, 450-453 (2012)
2012
-
[7]
& Renner, R
Ekert, A. & Renner, R. The ultimate physical limits of privacy.Nature507, 443-447 (2014)
2014
-
[8]
G., Horodecki, K., Horodecki, M., Horodecki, P
Ramanathan, R., Brand˜ ao, F. G., Horodecki, K., Horodecki, M., Horodecki, P. & Wojew´ odka, H. Random- ness amplification under minimal fundamental assump- tions on the devices.Physical Review Letters117, 230501 (2016)
2016
-
[9]
Realistic noise- tolerant randomness amplification using finite number of devices.Nature Communications7, 11345 (2016)
Brand˜ ao, F.G., Ramanathan, R., Grudka, A., Horodecki, K., Horodecki, M., Horodecki, P.et al. Realistic noise- tolerant randomness amplification using finite number of devices.Nature Communications7, 11345 (2016)
2016
-
[10]
& Arnon-Friedman, R
Kessler, M. & Arnon-Friedman, R. Device-independent randomness amplification and privatization.IEEE Jour- nal on Selected Areas in Information Theory1, 568-584 (2020)
2020
-
[11]
Ekert, A. K. Quantum cryptography based on Bell’s the- orem.Physical Review Letters67, 661 (1991)
1991
-
[12]
& Yao, A
Mayers, D. & Yao, A. Quantum cryptography with im- perfect apparatus. InProceedings 39th Annual Sympo- sium on Foundations of Computer Science(Cat. No. 98CB36280) pp. 503-509, IEEE (1998)
1998
-
[13]
& Kent, A
Barrett, J., Hardy, L. & Kent, A. No signaling and quan- tum key distribution.Physical Review Letters95, 010503 (2005)
2005
-
[14]
Device-independent security of quantum cryptography against collective attacks.Physical Review Letters98, 230501 (2007)
Ac´ ın, A., Brunner, N., Gisin, N., Massar, S., Pironio, S., & Scarani, V. Device-independent security of quantum cryptography against collective attacks.Physical Review Letters98, 230501 (2007)
2007
-
[15]
& Scarani, V
Pironio, S., Ac´ ın, A., Brunner, N., Gisin, N., Massar, S. & Scarani, V. Device-independent quantum key distri- bution secure against collective attacks.New Journal of Physics11, 045021 (2009)
2009
-
[16]
Z., Zhang, Q., Weinfurter, H
Zapatero, V., van Leent, T., Arnon-Friedman, R., Liu, W. Z., Zhang, Q., Weinfurter, H. & Curty, M. Ad- vances in device-independent quantum key distribution. npj quantum information9, 10 (2023)
2023
-
[17]
W., Yang, C
Lu, B. W., Yang, C. W., Wang, R. Q., Gao, B. F., Zhen, Y. Z., Wang, Z. G.et al. Device-independent quantum key distribution over 100 km with single atoms.Science 391, 592-597 (2026)
2026
-
[18]
Experimental quantum key distribution certified by Bell’s theorem.Nature607, 682- 686 (2022)
Nadlinger, D.P., Drmota, P., Nichol, B.C., Araneda, G., Main, D., Srinivas, R.et al. Experimental quantum key distribution certified by Bell’s theorem.Nature607, 682- 686 (2022)
2022
-
[19]
A device-independent quantum key distribution system for distant users.Na- ture607, 687-691 (2022)
Zhang, W., van Leent, T., Redeker, K., Garthoff, R., Schwonnek, R., Fertig, F.et al. A device-independent quantum key distribution system for distant users.Na- ture607, 687-691 (2022)
2022
-
[20]
Z., Zhang, Y
Liu, W. Z., Zhang, Y. Z., Zhen, Y. Z., Li, M. H., Liu, Y., Fan, J.et al. Toward a photonic demonstration of device- independent quantum key distribution.Physical Review Letters129, 050502 (2022)
2022
-
[21]
Agrawal, D., Archambeault, B., Rao, J. R. & Rohatgi, P. The EM side—channel(s). InInternational workshop on cryptographic hardware and embedded systemspp. 29-45, Springer Berlin Heidelberg (2002)
2002
-
[22]
& Molton, S
Lavaud, C., Gerzaguet, R., Gautier, M., Berder, O., Nogues, E. & Molton, S. Whispering devices: A survey on how side-channels lead to compromised information. Journal of Hardware and Systems Security5, 143-168 (2021)
2021
-
[23]
& Jun, B
Kocher, P., Jaffe, J. & Jun, B. Differential power analysis. InAnnual international cryptology conferencepp. 388- 397, Springer Berlin Heidelberg (1999)
1999
-
[24]
F., Horne, M
Clauser, J. F., Horne, M. A., Shimony, A., & Holt, R. A. Proposed experiment to test local hidden-variable theo- ries.Physical Review Letters23, 880 (1969)
1969
-
[25]
& Gisin, N
Barrett, J. & Gisin, N. How much measurement inde- pendence is needed to demonstrate nonlocality?.Physical Review Letters106, 100406 (2011)
2011
-
[26]
Hall, M. J. Relaxed Bell inequalities and Kochen-Specker theorems.Physical Review A,84, 022102 (2011)
2011
-
[27]
E., Hall, M
Koh, D. E., Hall, M. J., Setiawan, F. Pope, J. E., Mar- letto, C., Kay, A.et al. Effects of reduced measure- ment independence on Bell-based randomness expansion. Physical Review Letters109, 160404 (2012)
2012
-
[28]
J., Liang, Y
P¨ utz, G., Rosset, D., Barnea, T. J., Liang, Y. C. & Gisin, N. Arbitrarily small amount of measurement inde- pendence is sufficient to manifest quantum nonlocality. Physical Review Letters113, 190402 (2014)
2014
-
[29]
& Gisin, N
P¨ utz, G. & Gisin, N. Measurement dependent locality. New Journal of Physics18, 055006 (2016)
2016
-
[30]
S., Guth, A
Friedman, A. S., Guth, A. H., Hall, M. J., Kaiser, D. I. & Gallicchio, J. Relaxed Bell inequalities with arbitrary measurement dependence for each observer.Physical Re- view A99, 012121 (2019)
2019
-
[31]
Hall, M. J. W., & Branciard, C. Measurement- dependence cost for Bell nonlocality: Causal versus retro- causal models.Physical Review A102, 052228 (2020)
2020
-
[32]
ˇSupi´ c, I., Bancal, J. D. & Brunner, N. Quantum nonlo- cality in the presence of strong measurement dependence. Physical Review A108, 042207 (2023)
2023
-
[33]
triv- ial
In the literature on hidden-variable models, one often re- quests that the hidden variables lie in the backward light- cones of the test inputs. This rules out the possibility of “trivial” measurement-dependent hidden variables orig- inating in the causal future of the inputs, which would defeat the purpose that most theorists have in mind with hidden-var...
- [34]
-
[35]
& Cabello, A
Vieira, C., Ramanathan, R. & Cabello, A. Test of the physical significance of Bell non-locality.Nature Com- munications16, 4390 (2025)
2025
-
[36]
& Massar, S
Silman, J., Pironio, S. & Massar, S. Device-independent randomness generation in the presence of weak cross-talk. Physical Review Letters110, 100504 (2013)
2013
-
[37]
& Brukner, ˇC
Kofler, J., Paterek, T. & Brukner, ˇC. Experimenter’s freedom in Bell’s theorem and quantum cryptography. Physical Review A73, 022104 (2006). 9
2006
- [38]
-
[39]
(1) (needless to say, for arbitraryRandS,R=S asserts the entry-wise identification of the two behaviors)
IfXandYwere correlated to Λ,q λ|xy would generally differ fromq λ, thus invalidating the behavior equality of Eq. (1) (needless to say, for arbitraryRandS,R=S asserts the entry-wise identification of the two behaviors)
-
[40]
Hidden variables, joint probability, and the Bell inequalities.Physical Review Letters48, 291 (1982)
Fine, A. Hidden variables, joint probability, and the Bell inequalities.Physical Review Letters48, 291 (1982)
1982
-
[41]
(3) is customarily used as a characterization of local- ity, rather than a definition
Eq. (3) is customarily used as a characterization of local- ity, rather than a definition. The actual definition is the following: a behaviorPis called local if it admits a local hidden-variable model (as defined in Appendix A)
-
[42]
Security of practical private randomness generation.Physical Review A87, 012336 (2013)
Pironio, S., & Massar, S. Security of practical private randomness generation.Physical Review A87, 012336 (2013)
2013
-
[43]
No bound randomness in quantum nonlocality
Ramanathan, R., Liu, Y., Wu, Y., & Pironio, S. No bound randomness in quantum nonlocality. arXiv:2509.08623(2025)
-
[44]
D., Sheridan, L., & Scarani, V
Bancal, J. D., Sheridan, L., & Scarani, V. More random- ness from the same data.New Journal of Physics16, 033011 (2014)
2014
-
[45]
Using complete measurement statistics for optimal device- independent randomness evaluation.New Journal of Physics16, 013035 (2014)
Nieto-Silleras, O., Pironio, S., & Silman, J. Using complete measurement statistics for optimal device- independent randomness evaluation.New Journal of Physics16, 013035 (2014)
2014
-
[46]
Cirel’son, B. S. (1980). Quantum generalizations of Bell’s inequality.Letters in Mathematical Physics4, 93-100 (1980)
1980
-
[47]
& Bowles, J
ˇSupi´ c, I. & Bowles, J. Self-testing of quantum systems: a review.Quantum4, 337 (2020)
2020
-
[48]
Observe thatP uv =P λ qλ|uvPuvλ butP ̸= P uv quvPuv, because (U, V) is not independent of (X, Y)
-
[49]
Bounding the set of quantum correlations.Physical Review Letters98, 010401 (2007)
Navascu´ es, M., Pironio, S., & Ac´ ın, A. Bounding the set of quantum correlations.Physical Review Letters98, 010401 (2007)
2007
-
[50]
& Ac´ ın, A
Navascu´ es, M., Pironio, S. & Ac´ ın, A. A convergent hi- erarchy of semidefinite programs characterizing the set of quantum correlations.New Journal of Physics10, 073013 (2008)
2008
-
[51]
Lawson, T., Linden, N. & Popescu, S. Biased nonlocal quantum games.arXiv:1011.6245(2010)
-
[52]
& Ac´ ın, A
Masanes, L., Pironio, S. & Ac´ ın, A. Secure device- independent quantum key distribution with causally in- dependent measurement devices.Nature Communica- tions2, 238 (2011)
2011
-
[53]
W., Goh, K
Primaatmaja, I. W., Goh, K. T., Tan, E. Y. Z., Khoo, J. T. F., Ghorai, S. & Lim, C. C. W. Security of device- independent quantum key distribution protocols: a re- view.Quantum7, 932 (2023)
2023
-
[54]
Note that the mismatch probability between a local input and its leaked value is only defined if the output alphabet of the leakage channel contains the input alphabet
-
[55]
In the depolarizing noise model, the relationQ= 1−S obs/2 √ 2 /2 holds if the measurements are those saturating the Tsirelson’s bound with a maximally en- tangled state
-
[56]
Pearle, P. M. Hidden-variable example based upon data rejection.Physical Review D2, 1418 (1970)
1970
-
[57]
& Gisin, B
Gisin, N. & Gisin, B. A local hidden variable model of quantum correlation exploiting the detection loophole. Physics Letters A260, 323-327 (1999)
1999
-
[58]
& Kent, A
Barrett, J., Colbeck, R. & Kent, A. Memory attacks on device-independent quantum cryptography.Physical Re- view Letters110, 010503 (2013)
2013
-
[59]
Curty, M. & Lo, H. K. Foiling covert channels and mali- cious classical post-processing units in quantum key dis- tribution.npj Quantum Information5, 14 (2019)
2019
-
[60]
& Curty, M
Zapatero, V. & Curty, M. Secure quantum key distri- bution with a subset of malicious devices.npj Quantum Information7, 26 (2021)
2021
-
[61]
& Renner, R
Dupuis, F., Fawzi, O. & Renner, R. Entropy Accumula- tion.Communications in Mathematical Physics379, pp. 867–913 (2020)
2020
-
[62]
& Vidick, T
Arnon-Friedman, R., Dupuis, F., Fawzi, O., Renner, R. & Vidick, T. Practical device-independent quantum cryp- tography via entropy accumulation.Nature Communica- tions9, 459 (2018)
2018
-
[63]
Arqand, A., Hahn, T. A. & Tan, E. Y. Z. General- ized R´ enyi entropy accumulation theorem and general- ized quantum probability estimation.Physical Review X 15, 041013 (2025)
2025
-
[64]
& Fawzi, O
Brown, P., Fawzi, H. & Fawzi, O. Device-independent lower bounds on the conditional von Neumann entropy. Quantum8, 1445 (2024)
2024
-
[65]
Privacy amplification and decoupling without smoothing.IEEE Transactions on Information Theory 69, 7784-7792 (2023)
Dupuis, F. Privacy amplification and decoupling without smoothing.IEEE Transactions on Information Theory 69, 7784-7792 (2023)
2023
-
[66]
Hahn, T. A., Philip, A., Tan, E. Y. Z. & Brown, P. Analytic R´ enyi Entropy Bounds for Device-Independent Cryptography.arXiv:2507.07365(2025)
-
[67]
Nevertheless, the symmetry of the moment matrix al- ready encodes the hermiticity constraints on it
For the CHSH scenario, the quantum-mechanical con- straints on the independent local projectors include her- miticity, idempotence and commutation relations [50]. Nevertheless, the symmetry of the moment matrix al- ready encodes the hermiticity constraints on it
-
[68]
& Ara´ ujo, M
Tavakoli, A., Pozas-Kerstjens, A., Brown, P. & Ara´ ujo, M. Semidefinite programming relaxations for quantum correlations.Reviews of Modern Physics96, 045006 (2024)
2024
-
[69]
The automatic independence across groups uses the fact that no completeness relations apply on the operators ofF 1+AB, which guarantees that an arbitrary monomial with minimum lengthkcannot be expressed as a sum of monomials with minimum lengthk+ 1 (or larger)
-
[70]
& Pironio, S
Ac´ ın, A., Massar, S. & Pironio, S. Randomness versus nonlocality and entanglement.Physical Review Letters 108, 100402 (2012)
2012
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.