Device-independent quantum cryptography promises unprecedented security, but it is regarded as a theorist's dream and an experimentalist's nightmare. A new mathematical tool has now pushed its experimental demonstration much closer to reality.
References
Arnon-Friedman, R., Dupuis, F., Fawzi, O., Renner, R. & Vidick, T. Nat. Commun. https://doi.org/10.1038/s41467-017-02307-4 (2018).
Ekert, A. & Renner, R. Nature 507, 443–447 (2014).
Pironio, S. et al. New J. Phys. 11, 045021 (2009).
Vazirani, U. & Vidick, T. Phys. Rev. Lett. 113, 140501 (2014).
Reichardt, B. W., Unger, F. & Vazirani, U. Nature 496, 456–460 (2013).
Miller, C. A. & Shi, Y. In Proc. 2014 ACM Symp. on Theory of Computing 417–426 (Association for Computing Machinery, 2014).
Tomamichel, M., Colbeck, R. & Renner, R. IEEE Trans. Inf. Theory 55, 5840–5847 (2009).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ekert, A. The power of independence. Nature Phys 14, 114–115 (2018). https://doi.org/10.1038/nphys4346
Published:
Issue Date:
DOI: https://doi.org/10.1038/nphys4346
- Springer Nature Limited
This article is cited by
-
A novel quantum steganography-Steganalysis system for audio signals
Multimedia Tools and Applications (2020)
-
Quantum Byzantine Agreement with Tripartite Entangled States
International Journal of Theoretical Physics (2019)