Abstract
Building a quantum secure internet is one of the most important challenges in the field of quantum technologies [1,2]. It would ensure worldwide information-theoretically secure communication. The idea of quantum repeaters [3–5] gives hope that this dream will come true. However, the level of quantum security proposed originally in a seminal article by Bennett and Brassard [6] seems to be insufficient due to the fact that on the way between an honest manufacturer and an honest user, an active hacker can change with the inner workings of a quantum device, making it totally insecure [7]. Indeed, the hardware Trojan-horse attacks on random number generators are known [8], and the active hacking on quantum devices became a standard testing approach since the seminal attack by Makarov [9]. The idea of device-independent (DI) security overcomes this obstacle [7,10] (see also [11] and references therein). Although difficult to be done in practice, it has been demonstrated quite recently in several recent experiments [12–14]. In parallel, the study of the limitations of this approach in terms of upper bounds on the distillable key has been put forward [15–18]. However, these approaches focus on pointto-point quantum device-independent secure communication. In this paper we introduce the upper bounds on the performance of the device-independent conference key agreement (DI-CKA) [19,20]. The task of the conference agreement is to distribute to N > 2 honest parties the same secure key for one-time-pad encryption. A protocol achieving this task in a device-independent manner has been shown in Ref. [20]. We set an upper bound on the performance of such protocols in a network setting. We focus on physical behaviors with N users (for arbitrary N > 2), where each user is both the sender and receiver of the behavior treated as a black box. This situation is a special case of a network describable with a multiplex quantum channel where inputs and outputs are classical with quantum phenomena going inside the physical behavior [21]. All N trusted parties have the role of both the sender to and receiver from the channel and their goal is to obtain a secret key in a device-independent way against a quantum adversary. Aiming at upper bounds on the device-independent key, we narrow the consideration to the independent and identically distributed case. In this scenario, the honest parties share n identical devices. All the N parties set (classical) inputs x = (x1,..., xN ) to each of the n shared devices P(a|x) and receive (classical) outputs a = (a1,..., aN ) from each of them. We restrict our consideration to quantum devices. Such devices are realized by certain measurements M ≡ ⊗N i=1Mxi ai on quantum states ρA1,...,AN ≡ ρN(A). We define these devices (ρN(A),M) = Tr[ρN(A) ⊗N i=1 Mxi ai ]. In this work we provide upper bounds on the deviceindependent conference key distillation rates for arbitrary multipartite states. As the first main result, we introduce a multipartite generalization of the cc-squashed entanglement provided in Ref. [22] and developed in Ref. [18]. With a little abuse of notation with respect to that used in Refs. [16,18], for the sake of the reader, we will omit the fact that the measure is multipartite as well as reduce the abbreviation cc in its name and here call it just reduced c-squashed entanglement,