• Chinese Journal of Quantum Electronics
  • Vol. 38, Issue 1, 45 (2021)
Meng YE1、*, Likun XU1, Guanjin HUANG1, Jianhui LI1, and Yun LIU2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: 10.3969/j.issn.1007-5461.2021.01.007 Cite this Article
    YE Meng, XU Likun, HUANG Guanjin, LI Jianhui, LIU Yun. Research on new device-independent quantum key distribution protocol[J]. Chinese Journal of Quantum Electronics, 2021, 38(1): 45 Copy Citation Text show less
    References

    [1] Bennett C H, Brassard G. Quantum cryptography: Public-key distribution and coin tossing[C]. Proceedings of IEEE, International Conference on Computers, Systems and Signal Processing, 1984: 175-179.

    [2] Ekert A. Quantum cryptography based on Bell’s theorem[J]. Physical Review Letters, 1991, 67(6): 661-663.

    [3] Lo H, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances[J]. Science, 1999, 283(5410): 2050-2056.

    [4] Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol[J]. Physical Review Letters, 2000, 85(2): 441-444.

    [5] Renner R. Security of quantum key distribution[J]. International Journal of Quantum Information, 2008, 6(1): 1-127.

    [6] Scarani V, Bechmann-Pasquinucci H, Cerf N J, et al. The security of practical quantum key distribution[J]. Reviews of Modern Physics, 2009, 81(3): 1301-1350.

    [7] Jain N, Stiller B, Khan I, et al. Attacks on practical quantum key distribution systems (and how to prevent them)[J]. Contemporary Physics, 2016, 57(3): 366-387.

    [8] Li H, Wang S, Huang J, et al. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources[J]. Physical Review A, 2011, 84(6): 062308.

    [9] Lydersen L, Wiechers C, Wittmann C, et al. Hacking commercial quantum cryptography systems by tailored bright illumination[J]. Nature Photonics, 2010, 4(10): 686-689.

    [10] Qi B, Fung C F, Lo H, et al. Time-shift attack in practical quantum cryptosystems[J]. Quantum Information & Computation, 2007, 7(1): 73-82.

    [11] Jain N, Wittmann C, Lydersen L, et al. Device calibration impacts security of quantum key distribution[J]. Physical Review Letters, 2011, 107(11): 110501.

    [12] Barrett J, Hardy L, Kent A A, et al. No signaling and quantum key distribution[J]. Physical Review Letters, 2005, 95(1): 010503.

    [13] Pironio S, Acin A, Brunner N, et al. Device-independent quantum key distribution secure against collective attacks[J]. New Journal of Physics, 2009, 11(4): 045021.

    [14] Acin A, Masanes L. Certified randomness in quantum physics[J]. Nature, 2016, 540(7632): 213-219.

    [15] Arnonfriedman R, Renner R, Vidick T, et al. Simple and tight device-independent security proofs[J]. SIAM Journal on Computing, 2019, 48(1): 181-225.

    [16] Tan E Y, Lim C C, Renner R, et al. Advantage distillation for device-independent quantum key distribution[J]. Physical Review Letters, 2020, 124(2): 020502.

    [17] Bell J S. On the Einstein-Podolsky-Rosen paradox[J]. Physics, 1964, 1: 195-200.

    [18] Einstein A, Podolsky B, Rosen N. Can quantum-mechanical description of physical reality be considered complete?[J]. Physical Review, 1935, 47: 777.

    [19] Acin A, Massar S, Pironio S, et al. Randomness versus nonlocality and entanglement[J]. Physical Review Letters, 2012, 108(10): 100402.

    [20] Salavrakos A, Augusiak R, Tura J, et al. Bell inequalities tailored to maximally entangled states[J]. Physical Review Letters, 2017, 119(4): 040402.

    [21] Dhara C, Masanes L, Pironio S, et al. Security of device-independent quantum key distribution protocols[C]. Conference on Theory of Quantum Computation Communication and Cryptography, 2011: 13-22.

    CLP Journals

    [1] HE Yefeng, LI Lina, BAI Qian, CHEN Sihao, QIANG Yuwei. Quantum key distribution of detector’s dead time in heralded single photon source[J]. Chinese Journal of Quantum Electronics, 2023, 40(1): 112

    YE Meng, XU Likun, HUANG Guanjin, LI Jianhui, LIU Yun. Research on new device-independent quantum key distribution protocol[J]. Chinese Journal of Quantum Electronics, 2021, 38(1): 45
    Download Citation