The security of practical quantum key distribution

被引:2491
作者
Scarani, Valerio [1 ,2 ,3 ]
Bechmann-Pasquinucci, Helle [4 ,5 ]
Cerf, Nicolas J. [6 ]
Dusek, Miloslav [7 ]
Luetkenhaus, Norbert [8 ,9 ,10 ]
Peev, Momtchil [11 ]
机构
[1] Natl Univ Singapore, Ctr Quantum Technol, Singapore 117543, Singapore
[2] Natl Univ Singapore, Dept Phys, Singapore 117543, Singapore
[3] Univ Geneva, Appl Phys Grp, CH-1211 Geneva, Switzerland
[4] Univ Pavia, Dipartimento Fis A Volta, I-27100 Pavia, Italy
[5] UCCI IT, I-23888 Rovagnate, LC, Italy
[6] Free Univ Brussels, Ecole Polytech, B-1050 Brussels, Belgium
[7] Palacky Univ, Dept Opt, Fac Sci, Olomouc 77200, Czech Republic
[8] Univ Waterloo, Dept Phys & Astron, Waterloo, ON N2L 3G1, Canada
[9] Univ Waterloo, Inst Quantum Comp, Waterloo, ON N2L 3G1, Canada
[10] Univ Erlangen Nurnberg, Max Planck Res Grp, Inst Opt Informat & Photon, D-91058 Erlangen, Germany
[11] Austrian Res Ctr GmbH ARC, Smart Syst Div, A-1220 Donau City, Vienna, Austria
关键词
cryptographic protocols; information theory; quantum cryptography; UNCONDITIONAL SECURITY; PRIVACY AMPLIFICATION; DISTRIBUTION-SYSTEM; ENTANGLED PHOTONS; AVALANCHE PHOTODIODES; TELECOM WAVELENGTH; SPLITTING ATTACK; OPTICAL-FIBERS; BIT COMMITMENT; STATES ATTACK;
D O I
10.1103/RevModPhys.81.1301
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on an eavesdropper's power. This article provides a concise up-to-date review of QKD, biased toward the practical side. Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete-variable, continuous-variable, and distributed-phase-reference protocols).
引用
收藏
页码:1301 / 1350
页数:50
相关论文
共 337 条
  • [31] Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
  • [32] Bennett C. H., 1984, IBM Technical Disclosure Bulletin, V26, P4363
  • [33] Bennett C.H., 1984, P IEEE INT C COMP SY, V175, DOI DOI 10.1016/J.TCS.2014.05.025
  • [34] Generalized privacy amplification
    Bennett, CH
    Brassard, G
    Crepeau, C
    Maurer, UM
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) : 1915 - 1923
  • [35] PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION
    BENNETT, CH
    BRASSARD, G
    ROBERT, JM
    [J]. SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 210 - 229
  • [36] QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES
    BENNETT, CH
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (21) : 3121 - 3124
  • [37] QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM
    BENNETT, CH
    BRASSARD, G
    MERMIN, ND
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (05) : 557 - 559
  • [38] An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light
    Bethune, DS
    Risk, WP
    [J]. IEEE JOURNAL OF QUANTUM ELECTRONICS, 2000, 36 (03) : 340 - 347
  • [39] Single photon quantum cryptography
    Beveratos, A
    Brouri, R
    Gacoin, T
    Villing, A
    Poizat, JP
    Grangier, P
    [J]. PHYSICAL REVIEW LETTERS, 2002, 89 (18) : 1 - 187901
  • [40] Security of quantum key distribution against all collective attacks
    Biham, E
    Boyer, M
    Brassard, G
    van de Graaf, J
    Mor, T
    [J]. ALGORITHMICA, 2002, 34 (04) : 372 - 388