2018
DOI: 10.1088/1367-2630/aade06
|View full text |Cite
|
Sign up to set email alerts
|

Implementation vulnerabilities in general quantum cryptography

Abstract: Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security of a quantum cryptographic system. This has been shown to happen for quantum key distribution(QKD). Here we apply experience from implementation security of QKD to several other quantum cryptographic primitives. We survey quantum digital signatures, quantum secre… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
22
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 56 publications
(26 citation statements)
references
References 67 publications
0
22
0
Order By: Relevance
“…In Eq. (19), we assume that the random sampling of detections are i.i.d. The goal of estimating the smooth min-entropy H ǫ min X key B |E is to give an upper bound of the smooth max-entropy H ǫ max X key B |A n ω .…”
Section: B the Energy Testmentioning
confidence: 99%
“…In Eq. (19), we assume that the random sampling of detections are i.i.d. The goal of estimating the smooth min-entropy H ǫ min X key B |E is to give an upper bound of the smooth max-entropy H ǫ max X key B |A n ω .…”
Section: B the Energy Testmentioning
confidence: 99%
“…Eavesdroppers cannot get any useful information during a quantum communication process without introducing perturbations that inevitably reveal their interception [5]. However, eavesdroppers can exploit security loopholes that are introduced by non-ideal apparatuses and/or channels to attack practical quantum communication [6,7]. Quantum key distribution (QKD) is a useful quantum communication protocol that generates secure keys between separated parties in the presence of eavesdroppers [8].…”
Section: Introductionmentioning
confidence: 99%
“…In their experimental system, the transmitter employs different laser diodes to prepare specific states. This practice might induce a side channel when pulse shape and pulse width vary for different laser diodes [34]. As for Ref.…”
Section: Introductionmentioning
confidence: 99%