Abstract
AbstractDevice-independent quantum key distribution (DI-QKD) provides the gold standard for secure key exchange. Not only does it allow for information-theoretic security based on quantum mechanics, but it also relaxes the need to physically model the devices, thereby fundamentally ruling out many quantum hacking threats to which non-DI QKD systems are vulnerable. In practice though, DI-QKD is very challenging. It relies on the loophole-free violation of a Bell inequality, a task that requires high quality entanglement to be distributed between distant parties and close to perfect quantum measurements, which is hardly achievable with current technology. Notwithstanding, recent theoretical and experimental efforts have led to proof-of-principle DI-QKD implementations. In this article, we review the state-of-the-art of DI-QKD by highlighting its main theoretical and experimental achievements, discussing recent proof-of-principle demonstrations, and emphasizing the existing challenges in the field.
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Networks and Communications,Statistical and Nonlinear Physics,Computer Science (miscellaneous)
Reference149 articles.
1. Pirandola, S. et al. Advances in quantum cryptography. Adv. Opt. Photonics 12, 1012–1236 (2020).
2. Xu, F., Ma, X., Zhang, Q., Lo, H.-K. & Pan, J. W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 92, 025002 (2020).
3. Lo, H.-K., Curty, M. & Tamaki, K. Secure quantum key distribution. Nat. Photonics 8, 595–604 (2014).
4. Miller, F. Telegraphic code to insure privacy and secrecy in the transmission of telegrams. CM Cornwell (1882).
5. Vernam, G. S. Cipher printing telegraph systems: For secret wire and radio telegraphic communications. J. AIEE 45, 109–115 (1926).
Cited by
34 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献