Secure quantum key distribution with realistic devices

被引:955
作者
Xu, Feihu [1 ,2 ,3 ]
Ma, Xiongfeng [4 ]
Zhang, Qiang [1 ,2 ,3 ]
Lo, Hoi-Kwong [5 ,6 ]
Pan, Jian-Wei [1 ,2 ,3 ]
机构
[1] Univ Sci & Technol China, Hefei Natl Lab Phys Sci Microscale, Hefei 230026, Peoples R China
[2] Univ Sci & Technol China, Dept Modern Phys, Hefei 230026, Peoples R China
[3] Univ Sci & Technol China, Shanghai Branch, CAS Ctr Excellence & Synerget Innovat Ctr Quantum, Shanghai 201315, Peoples R China
[4] Tsinghua Univ, Inst Interdisciplinary Informat Sci, Ctr Quantum Informat, Beijing 100084, Peoples R China
[5] Univ Toronto, Ctr Quantum Informat & Quantum Control, Dept Phys, Toronto, ON M5S 3G4, Canada
[6] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
关键词
PARITY-CHECK CODES; SINGLE-PHOTON DETECTORS; UNCONDITIONAL SECURITY; BIT COMMITMENT; PRIVACY AMPLIFICATION; FIELD-TEST; CONTINUOUS-VARIABLES; DISTRIBUTION-SYSTEM; DIGITAL-SIGNATURES; ATOMIC ENSEMBLES;
D O I
10.1103/RevModPhys.92.025002
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In principle, quantum key distribution (QKD) offers information-theoretic security based on the laws of physics. In practice, however, the imperfections of realistic devices might introduce deviations from the idealized models used in security analyses. Can quantum code breakers successfully hack real systems by exploiting the side channels? Can quantum code makers design innovative countermeasures to foil quantum code breakers? Theoretical and experimental progress in the practical security aspects of quantum code making and quantum code breaking is reviewed. After numerous attempts, researchers now thoroughly understand and are able to manage the practical imperfections. Recent advances, such as the measurement-device-independent protocol, have closed critical side channels in the physical implementations, paving the way for secure QKD with realistic devices.
引用
收藏
页数:60
相关论文
共 516 条
[1]   Measurement-device-independent quantum key distribution with quantum memories [J].
Abruzzo, Silvestre ;
Kampermann, Hermann ;
Bruss, Dagmar .
PHYSICAL REVIEW A, 2014, 89 (01)
[2]   Device-independent security of quantum cryptography against collective attacks [J].
Acin, Antonio ;
Brunner, Nicolas ;
Gisin, Nicolas ;
Massar, Serge ;
Pironio, Stefano ;
Scarani, Valerio .
PHYSICAL REVIEW LETTERS, 2007, 98 (23)
[3]   Simple and efficient quantum key distribution with parametric down-conversion [J].
Adachi, Yoritoshi ;
Yamamoto, Takashi ;
Koashi, Masato ;
Imoto, Nobuyuki .
PHYSICAL REVIEW LETTERS, 2007, 99 (18)
[4]  
Aharonov D., 2000, Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, P705, DOI 10.1145/335305.335404
[5]   Large-alphabet quantum key distribution using energy-time entangled bipartite states [J].
Ali-Khan, Irfan ;
Broadbent, Curtis J. ;
Howell, John C. .
PHYSICAL REVIEW LETTERS, 2007, 98 (06)
[6]   Experimentally realizable quantum comparison of coherent states and its applications [J].
Andersson, Erika ;
Curty, Marcos ;
Jex, Igor .
PHYSICAL REVIEW A, 2006, 74 (02)
[7]  
[Anonymous], 1996, P 4 WORKSH PHYS COMP
[8]  
[Anonymous], 2019, ARXIV190510896
[9]  
[Anonymous], 2000, CODE BOOK SCI SECREC
[10]  
[Anonymous], 2019, ARXIV190110099