Advances in Quantum Cryptography

@article{Pirandola2019AdvancesIQ,
  title={Advances in Quantum Cryptography},
  author={Stefano Pirandola and Ulrik Lund Andersen and Leonardo Banchi and Mario Berta and Darius Bunandar and Roger Colbeck and D. Englund and Tobias Gehring and Cosmo Lupo and Carlo Ottaviani and Jason L. Pereira and Mohsen Razavi and Jesni Shamsul Shaari and Marco Tomamichel and Vladyslav C. Usenko and Giuseppe Vallone and Paolo Villoresi and Petros Wallden},
  journal={arXiv: Quantum Physics},
  year={2019}
}
Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle lab demonstrations to in-field implementations and technological prototypes. In this review, we provide both a general introduction and a state of the art description of the recent advances in the field, both theoretically and experimentally. We… 
Experimental Quantum Cryptography With Classical Users
TLDR
A novel quantum cryptography scheme, where users are fully classical, which gives the users access to a superimposed single photon and the key exchange is achieved via interaction-free measurements on the shared state.
Semi-quantum cryptography
TLDR
The history and current state-of-the-art in semi-quantum research is surveyed, including security proof methods and how classical post-processing can be used to counteract users' inability to perform certain quantum operations.
Benchmarking of Quantum Protocols
Quantum network protocols offer new functionalities such as enhanced security to communication and computational systems. Despite the rapid progress in quantum hardware, it has not yet reached a
Quantum Cryptography: Security for the Post-Quantum world
  • 2020
The predictions of quantum computing potential puts the world’s classical cryptography at risk of exploitation. Cryptographic protocols are used extensively on the World Wide Web. The
Quantum Sampling for Optimistic Finite Key Rates in High Dimensional Quantum Cryptography
TLDR
These sampling-based approaches to entropic uncertainty, and their application to quantum cryptography, hold great potential for deriving proofs of security for quantum cryptographic systems, and the approaches used here may be applicable to an even wider range of scenarios.
A semi-quantum extended B92 protocol and its analysis
TLDR
A new SQKD protocol based on an Extended B92 protocol which is able to counter certain practical attacks is presented, and may see broad application to other limited-resource (S)QKD protocols.
Optical designs for realization of a set of schemes for quantum cryptography
TLDR
This paper has proposed optical designs for the implementation of two single photon and one entangled state based controlled quantum dialogue schemes and subsequently reduced their optical designs to yield simpler designs for realizing other secure quantum communication tasks.
An Introduction to Practical Quantum Key Distribution
Quantum technology, and especially quantum computing, is advancing rapidly. Our every-day secure communication infrastructure relies heavily on public key cryptography; unfortunately, many public key
Experimental demonstration of memory-enhanced quantum communication
TLDR
A solid-state spin memory is used to demonstrate quantum repeater functionality, which has the potential to overcome photon losses involved in long-distance transmission of quantum information.
Advances in space quantum communications
Concerted efforts are underway to establish an infrastructure for a global quantum internet to realise a spectrum of quantum technologies. This will enable more precise sensors, secure
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 1,019 REFERENCES
Tight finite-key analysis for quantum cryptography
TLDR
Here it is shown that gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies.
Quantum cryptography beyond quantum key distribution
TLDR
This review article, aimed primarily at cryptographers unfamiliar with the quantum world, survey the area of theoretical quantum cryptography, with an emphasis on the constructions and limitations beyond the realm of QKD.
Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations
TLDR
The principle of continuous-variable quantum key distribution is described, focusing in particular on protocols based on coherent states, and the security of these protocols is discussed and the state-of-the-art in experimental implementations are reported, including the issue of side-channel attacks.
Implementation vulnerabilities in general quantum cryptography
TLDR
Experience from implementation security of QKD is applied to other quantum cryptographic primitives: quantum digital signatures, quantum secret sharing, source-independent quantum random number generation, quantum secure direct communication, and blind quantum computing.
Device-independent quantum cryptography for continuous variables
We present the first device-independent quantum cryptography protocol for continuous variables. Our scheme is based on the Gottesman-Kitaev-Preskill encoding scheme whereby a qubit is embedded in the
Fully device independent quantum key distribution
TLDR
This work rigorously proves the device-independent security of an entanglement-based protocol building on Ekert's original proposal for quantum key distribution and builds on techniques from the classical theory of pseudo-randomness to achieve a new quantitative understanding of the non-local nature of quantum correlations.
Quantum cryptography with realistic devices
TLDR
Recent advances, such as the measurement-device-independent QKD protocol, have closed the critical side channels in the physical implementations, enabling secure QKKD with realistic devices.
High-rate measurement-device-independent quantum cryptography
TLDR
A coherent-state network protocol able to achieve remarkably high key rates at metropolitan distances, in fact three orders of magnitude higher than those currently achieved, is designed and proposed.
Security of quantum key distribution
  • R. Renner
  • Computer Science, Physics
    Ausgezeichnete Informatikdissertationen
  • 2005
TLDR
This work proposes an approach which allows us to study general physical systems for which the above mentioned independence condition does not necessarily hold, and introduces new uncertainty measures, called smooth min- and max-entropy, which are generalizations of information-theoretical notions.
Practical device-independent quantum cryptography via entropy accumulation
TLDR
A property of entropy, termed “entropy accumulation”, is presented, which asserts that the total amount of entropy of a large system is the sum of its parts, which is used to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters.
...
1
2
3
4
5
...