2022
DOI: 10.1038/s41586-022-04891-y
|View full text |Cite
|
Sign up to set email alerts
|

A device-independent quantum key distribution system for distant users

Abstract: Device-independent quantum key distribution (DIQKD) enables the generation of secret keys over an untrusted channel using uncharacterized and potentially untrusted devices1–9. The proper and secure functioning of the devices can be certified by a statistical test using a Bell inequality10–12. This test originates from the foundations of quantum physics and also ensures robustness against implementation loopholes13, thereby leaving only the integrity of the users’ locations to be guaranteed by other means. The … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
80
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 140 publications
(81 citation statements)
references
References 43 publications
1
80
0
Order By: Relevance
“…The resulting bound holds independently of the actual value of A 1 thanks to the monotonicity property discussed below: if we make in bound 3 the replacement | A 1 | → 0 we obtain a bound that remains valid 5. In the case of bounds (10), (11),(17), it also follows from the stronger property that the function fq(x) is monotonically increasing in x, as shown in Appendix B. of[14].…”
mentioning
confidence: 86%
See 2 more Smart Citations
“…The resulting bound holds independently of the actual value of A 1 thanks to the monotonicity property discussed below: if we make in bound 3 the replacement | A 1 | → 0 we obtain a bound that remains valid 5. In the case of bounds (10), (11),(17), it also follows from the stronger property that the function fq(x) is monotonically increasing in x, as shown in Appendix B. of[14].…”
mentioning
confidence: 86%
“…The monotonicity of the bound (13) is established in Appendix A from which the monotonicity of the other bounds follows 5 . This property will be important in Section 2.3 as it allows replacing in the entropy bounds the correlators on which they depend in the right-hand side by a lower bound on these correlators and in Section 2.4 where it allows the systematic computation of a convex envelope based on a discrete set of points.…”
Section: Monotonicity Property the Entropy Boundsmentioning
confidence: 99%
See 1 more Smart Citation
“…Credit: W. Z. Liu and C. Wu/University of Science and Technology of China the protocols specify. Now three research groups, one based in Germany, one in the UK, and one in China, have independently performed proof-of-principle experiments of a quantum encryption method that can secure information even if the devices used do not behave exactly as predicted [1][2][3]. The demonstrations are "a major breakthrough for cybersecurity," says Charles Lim of the National University of Singapore, who was involved in the Germany-based experiments.…”
Section: Hiding Secrets Using Quantum Entanglementmentioning
confidence: 99%
“…In particular, in quantum communication, BSMs facilitate entanglement swapping and thereby the implementation of quantum repeaters. Furthermore, BSMs enable the realisation of measurement-device-independent quantum communication [9][10][11][12][13][14][15][16]. In quantum computing, BSMs have an important role in photonic quantum computing, in particular in measurement-based and fusion-based approaches [17][18][19][20], where, BSMs are an integral part of the generation of resource states for photonic quantum computing and in fusing small-scale units to large resource states for the realisation of quantum error correction [21,22].…”
Section: Introductionmentioning
confidence: 99%