The security of practical quantum key distribution

被引:2593
作者
Scarani, Valerio [1 ,2 ,3 ]
Bechmann-Pasquinucci, Helle [4 ,5 ]
Cerf, Nicolas J. [6 ]
Dusek, Miloslav [7 ]
Luetkenhaus, Norbert [8 ,9 ,10 ]
Peev, Momtchil [11 ]
机构
[1] Natl Univ Singapore, Ctr Quantum Technol, Singapore 117543, Singapore
[2] Natl Univ Singapore, Dept Phys, Singapore 117543, Singapore
[3] Univ Geneva, Appl Phys Grp, CH-1211 Geneva, Switzerland
[4] Univ Pavia, Dipartimento Fis A Volta, I-27100 Pavia, Italy
[5] UCCI IT, I-23888 Rovagnate, LC, Italy
[6] Free Univ Brussels, Ecole Polytech, B-1050 Brussels, Belgium
[7] Palacky Univ, Dept Opt, Fac Sci, Olomouc 77200, Czech Republic
[8] Univ Waterloo, Dept Phys & Astron, Waterloo, ON N2L 3G1, Canada
[9] Univ Waterloo, Inst Quantum Comp, Waterloo, ON N2L 3G1, Canada
[10] Univ Erlangen Nurnberg, Max Planck Res Grp, Inst Opt Informat & Photon, D-91058 Erlangen, Germany
[11] Austrian Res Ctr GmbH ARC, Smart Syst Div, A-1220 Donau City, Vienna, Austria
关键词
cryptographic protocols; information theory; quantum cryptography; UNCONDITIONAL SECURITY; PRIVACY AMPLIFICATION; DISTRIBUTION-SYSTEM; ENTANGLED PHOTONS; AVALANCHE PHOTODIODES; TELECOM WAVELENGTH; SPLITTING ATTACK; OPTICAL-FIBERS; BIT COMMITMENT; STATES ATTACK;
D O I
10.1103/RevModPhys.81.1301
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on an eavesdropper's power. This article provides a concise up-to-date review of QKD, biased toward the practical side. Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete-variable, continuous-variable, and distributed-phase-reference protocols).
引用
收藏
页码:1301 / 1350
页数:50
相关论文
共 337 条
[31]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[32]  
Bennett C. H., 1984, IBM Technical Disclosure Bulletin, V26, P4363
[33]  
Bennett C.H., 1984, P IEEE INT C COMP SY, V175, DOI DOI 10.1016/J.TCS.2014.05.025
[34]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[35]   PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION [J].
BENNETT, CH ;
BRASSARD, G ;
ROBERT, JM .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :210-229
[36]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[37]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[38]   An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light [J].
Bethune, DS ;
Risk, WP .
IEEE JOURNAL OF QUANTUM ELECTRONICS, 2000, 36 (03) :340-347
[39]   Single photon quantum cryptography [J].
Beveratos, A ;
Brouri, R ;
Gacoin, T ;
Villing, A ;
Poizat, JP ;
Grangier, P .
PHYSICAL REVIEW LETTERS, 2002, 89 (18) :1-187901
[40]   Security of quantum key distribution against all collective attacks [J].
Biham, E ;
Boyer, M ;
Brassard, G ;
van de Graaf, J ;
Mor, T .
ALGORITHMICA, 2002, 34 (04) :372-388