2022
DOI: 10.3390/e24020260
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Security Evaluation of Practical Quantum Key Distribution System

Abstract: Although the unconditional security of quantum key distribution (QKD) has been widely studied, the imperfections of the practical devices leave potential loopholes for Eve to spy the final key. Thus, how to evaluate the security of QKD with realistic devices is always an interesting and opening question. In this paper, we briefly review the development of quantum hacking and security evaluation technology for a practical decoy state BB84 QKD system. The security requirement and parameters in each module (sourc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 40 publications
(23 citation statements)
references
References 69 publications
0
23
0
Order By: Relevance
“…Nevertheless, to the best of our knowledge, a more detailed study on the effects of quantum hacking techniques on QOT protocols is lacking in the literature. For a more in-depth review of quantum hacking techniques applied to QKD systems, we refer to Sun and Huang [ 40 ] and Pirandola et al [ 38 ].…”
Section: Qot Protocols With Assumptionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Nevertheless, to the best of our knowledge, a more detailed study on the effects of quantum hacking techniques on QOT protocols is lacking in the literature. For a more in-depth review of quantum hacking techniques applied to QKD systems, we refer to Sun and Huang [ 40 ] and Pirandola et al [ 38 ].…”
Section: Qot Protocols With Assumptionsmentioning
confidence: 99%
“…Usually, its analysis is integrated into more general surveys under the topic of “quantum cryptography”, leading to a less in-depth exposition of the topic. For reference, we provide some distinctive reviews on the general topic of quantum cryptography [ 1 , 34 , 35 , 36 , 37 , 38 , 39 , 40 ].…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless, to the best of our knowledge, a more detailed study on the effects of quantum hacking techniques on QOT protocols is lacking in the literature. For a more in-depth review of quantum hacking techniques applied to QKD systems, we refer to Sun and Huang [SH22] and Pirandola et al…”
Section: Device-independent Qot In the Limited-quantum-storage Modelmentioning
confidence: 99%
“…Usually, its analysis is integrated into more general surveys under the topic of "quantum cryptography", leading to a less in-depth exposition of the topic. For reference, we provide some distinctive reviews on the general topic of quantum cryptography [BC96, Bra05, MQ06, Feh10, BS15, PAB + 20, PR21,SH22].…”
Section: Introductionmentioning
confidence: 99%
“…Quantum key distribution (QKD), which guarantees information-theoretically secure communication in theory, has become one of the most widely applied techniques of quantum information processing [1,2]. However, practical imperfections in devices challenge the theoretically-guaranteed security during QKD globalscale deployment [3][4][5][6][7][8][9][10][11][12]. Fortunately, a measurementdevice-independent (MDI) QKD protocol [13] is immune to all measurement-side secure loopholes, because this protocol does not make assumption on the measurement devices.…”
Section: Introductionmentioning
confidence: 99%