# Advances in Quantum Cryptography

@article{Pirandola2019AdvancesIQ, title={Advances in Quantum Cryptography}, author={Stefano Pirandola and Ulrik Lund Andersen and Leonardo Banchi and Mario Berta and Darius Bunandar and Roger Colbeck and D. Englund and Tobias Gehring and Cosmo Lupo and Carlo Ottaviani and Jason L. Pereira and Mohsen Razavi and Jesni Shamsul Shaari and Marco Tomamichel and Vladyslav C. Usenko and Giuseppe Vallone and Paolo Villoresi and Petros Wallden}, journal={arXiv: Quantum Physics}, year={2019} }

Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle lab demonstrations to in-field implementations and technological prototypes. In this review, we provide both a general introduction and a state of the art description of the recent advances in the field, both theoretically and experimentally. We…

## Figures, Tables, and Topics from this paper

## 322 Citations

Experimental Quantum Cryptography With Classical Users

- Computer Science, Physics
- 2019

A novel quantum cryptography scheme, where users are fully classical, which gives the users access to a superimposed single photon and the key exchange is achieved via interaction-free measurements on the shared state.

Semi-quantum cryptography

- Computer Science, PhysicsQuantum Inf. Process.
- 2020

The history and current state-of-the-art in semi-quantum research is surveyed, including security proof methods and how classical post-processing can be used to counteract users' inability to perform certain quantum operations.

Benchmarking of Quantum Protocols

- Physics
- 2021

Quantum network protocols offer new functionalities such as enhanced security to communication and computational systems. Despite the rapid progress in quantum hardware, it has not yet reached a…

Quantum Cryptography: Security for the Post-Quantum world

- 2020

The predictions of quantum computing potential puts the world’s classical cryptography at risk of exploitation. Cryptographic protocols are used extensively on the World Wide Web. The…

Quantum Sampling for Optimistic Finite Key Rates in High Dimensional Quantum Cryptography

- Computer Science, Physics
- 2020

These sampling-based approaches to entropic uncertainty, and their application to quantum cryptography, hold great potential for deriving proofs of security for quantum cryptographic systems, and the approaches used here may be applicable to an even wider range of scenarios.

A semi-quantum extended B92 protocol and its analysis

- Engineering, Computer ScienceDefense + Commercial Sensing
- 2020

A new SQKD protocol based on an Extended B92 protocol which is able to counter certain practical attacks is presented, and may see broad application to other limited-resource (S)QKD protocols.

Optical designs for realization of a set of schemes for quantum cryptography

- Physics, Computer ScienceOptical and Quantum Electronics
- 2021

This paper has proposed optical designs for the implementation of two single photon and one entangled state based controlled quantum dialogue schemes and subsequently reduced their optical designs to yield simpler designs for realizing other secure quantum communication tasks.

An Introduction to Practical Quantum Key Distribution

- IEEE Aerospace and Electronic Systems Magazine
- 2021

Quantum technology, and especially quantum computing, is advancing rapidly. Our every-day secure communication infrastructure relies heavily on public key cryptography; unfortunately, many public key…

Experimental demonstration of memory-enhanced quantum communication

- Mathematics, MedicineNature
- 2020

A solid-state spin memory is used to demonstrate quantum repeater functionality, which has the potential to overcome photon losses involved in long-distance transmission of quantum information.

Advances in space quantum communications

- PhysicsIET Quantum Communication
- 2021

Concerted efforts are underway to establish an infrastructure for a global quantum internet to realise a spectrum of quantum technologies. This will enable more precise sensors, secure…

## References

SHOWING 1-10 OF 1,019 REFERENCES

Tight finite-key analysis for quantum cryptography

- Computer Science, MedicineNature communications
- 2012

Here it is shown that gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies.

Quantum cryptography beyond quantum key distribution

- Mathematics, PhysicsDes. Codes Cryptogr.
- 2016

This review article, aimed primarily at cryptographers unfamiliar with the quantum world, survey the area of theoretical quantum cryptography, with an emphasis on the constructions and limitations beyond the realm of QKD.

Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

- Computer Science, MathematicsEntropy
- 2015

The principle of continuous-variable quantum key distribution is described, focusing in particular on protocols based on coherent states, and the security of these protocols is discussed and the state-of-the-art in experimental implementations are reported, including the issue of side-channel attacks.

Implementation vulnerabilities in general quantum cryptography

- Computer Science, PhysicsNew Journal of Physics
- 2018

Experience from implementation security of QKD is applied to other quantum cryptographic primitives: quantum digital signatures, quantum secret sharing, source-independent quantum random number generation, quantum secure direct communication, and blind quantum computing.

Device-independent quantum cryptography for continuous variables

- Physics
- 2014

We present the first device-independent quantum cryptography protocol for continuous variables. Our scheme is based on the Gottesman-Kitaev-Preskill encoding scheme whereby a qubit is embedded in the…

Fully device independent quantum key distribution

- Physics, MedicineCommun. ACM
- 2019

This work rigorously proves the device-independent security of an entanglement-based protocol building on Ekert's original proposal for quantum key distribution and builds on techniques from the classical theory of pseudo-randomness to achieve a new quantitative understanding of the non-local nature of quantum correlations.

Quantum cryptography with realistic devices

- Physics, Computer Science
- 2019

Recent advances, such as the measurement-device-independent QKD protocol, have closed the critical side channels in the physical implementations, enabling secure QKKD with realistic devices.

High-rate measurement-device-independent quantum cryptography

- Computer Science
- 2015

A coherent-state network protocol able to achieve remarkably high key rates at metropolitan distances, in fact three orders of magnitude higher than those currently achieved, is designed and proposed.

Security of quantum key distribution

- Computer Science, PhysicsAusgezeichnete Informatikdissertationen
- 2005

This work proposes an approach which allows us to study general physical systems for which the above mentioned independence condition does not necessarily hold, and introduces new uncertainty measures, called smooth min- and max-entropy, which are generalizations of information-theoretical notions.

Practical device-independent quantum cryptography via entropy accumulation

- Computer Science, MedicineNature Communications
- 2017

A property of entropy, termed “entropy accumulation”, is presented, which asserts that the total amount of entropy of a large system is the sum of its parts, which is used to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters.