A Review of Security Evaluation of Practical Quantum Key Distribution System
- PMID: 35205554
- PMCID: PMC8870823
- DOI: 10.3390/e24020260
A Review of Security Evaluation of Practical Quantum Key Distribution System
Abstract
Although the unconditional security of quantum key distribution (QKD) has been widely studied, the imperfections of the practical devices leave potential loopholes for Eve to spy the final key. Thus, how to evaluate the security of QKD with realistic devices is always an interesting and opening question. In this paper, we briefly review the development of quantum hacking and security evaluation technology for a practical decoy state BB84 QKD system. The security requirement and parameters in each module (source, encoder, decoder and detector) are discussed, and the relationship between quantum hacking and security parameter are also shown.
Keywords: practical security; quantum communication; quantum cryptography; quantum key distribution; security evaluation.
Conflict of interest statement
The authors declare no conflict of interest.
Figures










References
-
- Bennett C.H., Brassard G. Quantum cryptography: Public key distribution and con tossing; Proceedings of the International Conference on Computers, Systems and Signal Processing; Bangalore, India. 9–12 December 1984; pp. 175–179.
-
- Stucki D., Brunner N., Gisin N., Scarani V., Zbinden H. Fast and simple one-way quantum key distribution. Appl. Phys. Lett. 2005;87:194108. doi: 10.1063/1.2126792. - DOI
-
- Branciard C., Gisin N., Scarani V. Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography. New J. Phys. 2008;10:013031. doi: 10.1088/1367-2630/10/1/013031. - DOI
-
- Cerf N.J., Lévy M., Assche G.V. Quantum distribution of Gaussian keys using squeezed states. Phys. Rev. A. 2001;63:052311. doi: 10.1103/PhysRevA.63.052311. - DOI
Publication types
Grants and funding
LinkOut - more resources
Full Text Sources
Other Literature Sources