The security and recent technology of quantum key distribution

被引:1
|
作者
Wang X.-B. [1 ]
Ying H. [2 ]
Ma H.-X. [2 ]
Peng C.-Z. [1 ]
Yang T. [3 ]
Pan J.-W. [3 ]
机构
[1] Department of Physics, Tsinghua University
[2] China Electronic System Engineering Company
[3] Hefei National Laboratory for Physical Sciences at Microscale, University of Science and Technology of China
来源
Frontiers of Physics in China | 2006年 / 1卷 / 3期
关键词
BB84; method; Decoy-state method; Photon-number-splitting attack; QKD; Security;
D O I
10.1007/s11467-006-0023-y
中图分类号
学科分类号
摘要
In principle, quantum key distribution (QKD) can be used to make unconditionally secure private communication. However, the security of the existing real system for QKD needs to be carefully examined. Actually, the existing experiments based on weak coherent states are not secure under photon-number-splitting attack. Fortunately, the decoy-state method and the entanglement-distribution method can be used to realize the unconditionally secure QKD based on real-life systems with existing technology. © Higher Education Press and Springer-Verlag 2006.
引用
收藏
页码:251 / 255
页数:4
相关论文
共 50 条
  • [1] Security of Quantum Key Distribution
    Beaudry, Normand
    Ferenczi, Agnes
    Narasimhachar, Varun
    Moroder, Tobias
    Ma, Xiongfeng
    Piani, Marco
    Luekenhaus, Norbert
    2010 CONFERENCE ON OPTICAL FIBER COMMUNICATION OFC COLLOCATED NATIONAL FIBER OPTIC ENGINEERS CONFERENCE OFC-NFOEC, 2010,
  • [2] Security of quantum key distribution
    Renner, Renato
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2008, 6 (01) : 1 - 127
  • [3] Security of Quantum Key Distribution
    Yuen, Horace P.
    IEEE ACCESS, 2016, 4 : 724 - 749
  • [4] Security of a control key in quantum key distribution
    Rehman, Junaid Ur
    Qaisar, Saad
    Jeong, Youngmin
    Shin, Hyundong
    MODERN PHYSICS LETTERS B, 2017, 31 (11):
  • [5] On the Security of Quantum Key Distribution Networks
    Lella, Eufemia
    Schmid, Giovanni
    CRYPTOGRAPHY, 2023, 7 (04)
  • [6] Security Proof of Quantum Key Distribution
    Tamaki, Kiyoshi
    Tsurumaru, Toyohiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (05) : 880 - 888
  • [7] Implementation Security in Quantum Key Distribution
    Zapatero, Victor
    Navarrete, lvaro
    Curty, Marcos
    ADVANCED QUANTUM TECHNOLOGIES, 2025, 8 (02)
  • [8] Security Processor with Quantum Key Distribution
    Loruenser, Thomas
    Querasser, Edwin
    Matyus, Thomas
    Peev, Momtchil
    Wolkerstorfer, Johannes
    Hutter, Michael
    Szekely, Alexander
    Wimberger, Ilse
    Pfaffel-Janser, Christian
    Neppach, Andreas
    2008 INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2008, : 37 - +
  • [9] On the security and confidentiality of quantum key distribution
    Al-Ghamdi, Al-Batool
    Al-Sulami, Ameenah
    Aljahdali, Asia Othman
    SECURITY AND PRIVACY, 2020, 3 (05)
  • [10] A proof of the security of quantum key distribution
    Biham, Eli
    Boyer, Michel
    Boykin, P. Oscar
    Mor, Tal
    Roychowdhury, Vwani
    JOURNAL OF CRYPTOLOGY, 2006, 19 (04) : 381 - 439