Cargando…
A Review of Security Evaluation of Practical Quantum Key Distribution System
Although the unconditional security of quantum key distribution (QKD) has been widely studied, the imperfections of the practical devices leave potential loopholes for Eve to spy the final key. Thus, how to evaluate the security of QKD with realistic devices is always an interesting and opening ques...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8870823/ https://www.ncbi.nlm.nih.gov/pubmed/35205554 http://dx.doi.org/10.3390/e24020260 |
_version_ | 1784656849255006208 |
---|---|
author | Sun, Shihai Huang, Anqi |
author_facet | Sun, Shihai Huang, Anqi |
author_sort | Sun, Shihai |
collection | PubMed |
description | Although the unconditional security of quantum key distribution (QKD) has been widely studied, the imperfections of the practical devices leave potential loopholes for Eve to spy the final key. Thus, how to evaluate the security of QKD with realistic devices is always an interesting and opening question. In this paper, we briefly review the development of quantum hacking and security evaluation technology for a practical decoy state BB84 QKD system. The security requirement and parameters in each module (source, encoder, decoder and detector) are discussed, and the relationship between quantum hacking and security parameter are also shown. |
format | Online Article Text |
id | pubmed-8870823 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-88708232022-02-25 A Review of Security Evaluation of Practical Quantum Key Distribution System Sun, Shihai Huang, Anqi Entropy (Basel) Review Although the unconditional security of quantum key distribution (QKD) has been widely studied, the imperfections of the practical devices leave potential loopholes for Eve to spy the final key. Thus, how to evaluate the security of QKD with realistic devices is always an interesting and opening question. In this paper, we briefly review the development of quantum hacking and security evaluation technology for a practical decoy state BB84 QKD system. The security requirement and parameters in each module (source, encoder, decoder and detector) are discussed, and the relationship between quantum hacking and security parameter are also shown. MDPI 2022-02-10 /pmc/articles/PMC8870823/ /pubmed/35205554 http://dx.doi.org/10.3390/e24020260 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Sun, Shihai Huang, Anqi A Review of Security Evaluation of Practical Quantum Key Distribution System |
title | A Review of Security Evaluation of Practical Quantum Key Distribution System |
title_full | A Review of Security Evaluation of Practical Quantum Key Distribution System |
title_fullStr | A Review of Security Evaluation of Practical Quantum Key Distribution System |
title_full_unstemmed | A Review of Security Evaluation of Practical Quantum Key Distribution System |
title_short | A Review of Security Evaluation of Practical Quantum Key Distribution System |
title_sort | review of security evaluation of practical quantum key distribution system |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8870823/ https://www.ncbi.nlm.nih.gov/pubmed/35205554 http://dx.doi.org/10.3390/e24020260 |
work_keys_str_mv | AT sunshihai areviewofsecurityevaluationofpracticalquantumkeydistributionsystem AT huanganqi areviewofsecurityevaluationofpracticalquantumkeydistributionsystem AT sunshihai reviewofsecurityevaluationofpracticalquantumkeydistributionsystem AT huanganqi reviewofsecurityevaluationofpracticalquantumkeydistributionsystem |