Cargando…

A Review of Security Evaluation of Practical Quantum Key Distribution System

Although the unconditional security of quantum key distribution (QKD) has been widely studied, the imperfections of the practical devices leave potential loopholes for Eve to spy the final key. Thus, how to evaluate the security of QKD with realistic devices is always an interesting and opening ques...

Descripción completa

Detalles Bibliográficos
Autores principales: Sun, Shihai, Huang, Anqi
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8870823/
https://www.ncbi.nlm.nih.gov/pubmed/35205554
http://dx.doi.org/10.3390/e24020260
_version_ 1784656849255006208
author Sun, Shihai
Huang, Anqi
author_facet Sun, Shihai
Huang, Anqi
author_sort Sun, Shihai
collection PubMed
description Although the unconditional security of quantum key distribution (QKD) has been widely studied, the imperfections of the practical devices leave potential loopholes for Eve to spy the final key. Thus, how to evaluate the security of QKD with realistic devices is always an interesting and opening question. In this paper, we briefly review the development of quantum hacking and security evaluation technology for a practical decoy state BB84 QKD system. The security requirement and parameters in each module (source, encoder, decoder and detector) are discussed, and the relationship between quantum hacking and security parameter are also shown.
format Online
Article
Text
id pubmed-8870823
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-88708232022-02-25 A Review of Security Evaluation of Practical Quantum Key Distribution System Sun, Shihai Huang, Anqi Entropy (Basel) Review Although the unconditional security of quantum key distribution (QKD) has been widely studied, the imperfections of the practical devices leave potential loopholes for Eve to spy the final key. Thus, how to evaluate the security of QKD with realistic devices is always an interesting and opening question. In this paper, we briefly review the development of quantum hacking and security evaluation technology for a practical decoy state BB84 QKD system. The security requirement and parameters in each module (source, encoder, decoder and detector) are discussed, and the relationship between quantum hacking and security parameter are also shown. MDPI 2022-02-10 /pmc/articles/PMC8870823/ /pubmed/35205554 http://dx.doi.org/10.3390/e24020260 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Sun, Shihai
Huang, Anqi
A Review of Security Evaluation of Practical Quantum Key Distribution System
title A Review of Security Evaluation of Practical Quantum Key Distribution System
title_full A Review of Security Evaluation of Practical Quantum Key Distribution System
title_fullStr A Review of Security Evaluation of Practical Quantum Key Distribution System
title_full_unstemmed A Review of Security Evaluation of Practical Quantum Key Distribution System
title_short A Review of Security Evaluation of Practical Quantum Key Distribution System
title_sort review of security evaluation of practical quantum key distribution system
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8870823/
https://www.ncbi.nlm.nih.gov/pubmed/35205554
http://dx.doi.org/10.3390/e24020260
work_keys_str_mv AT sunshihai areviewofsecurityevaluationofpracticalquantumkeydistributionsystem
AT huanganqi areviewofsecurityevaluationofpracticalquantumkeydistributionsystem
AT sunshihai reviewofsecurityevaluationofpracticalquantumkeydistributionsystem
AT huanganqi reviewofsecurityevaluationofpracticalquantumkeydistributionsystem