Some physics and system issues in the security analysis of quantum key distribution protocols

被引:6
|
作者
Yuen, Horace P. [1 ,2 ]
机构
[1] Northwestern Univ, Dept Elect Engn & Comp Sci, Evanston, IL 60208 USA
[2] Northwestern Univ, Dept Phys & Astron, Evanston, IL 60208 USA
关键词
Quantum key distribution; Quantum cryptography; Quantum optics; UNCONDITIONAL SECURITY; COHERENT STATES; CRYPTOGRAPHY; PROOF;
D O I
10.1007/s11128-014-0756-4
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this paper, we review a number of issues on the security of quantum key distribution (QKD) protocols that bear directly on the relevant physics or mathematical representation of the QKD cryptosystem. It is shown that the cryptosystem representation itself may miss out many possible attacks, which are not accounted for in the security analysis and proofs. Hence, the final security claims drawn from such analysis are not reliable, apart from foundational issues about the security criteria that are discussed elsewhere. The cases of continuous-variable QKD and multi-photon sources are elaborated upon.
引用
收藏
页码:2241 / 2254
页数:14
相关论文
共 50 条
  • [31] Security of biased BB84 quantum key distribution with finite resource
    Zhao Liang-Yuan
    Li Hong-Wei
    Yin Zhen-Qiang
    Chen Wei
    You Juan
    Han Zheng-Fu
    CHINESE PHYSICS B, 2014, 23 (10)
  • [32] A Review of Quantum Key Distribution Protocols in the Perspective of Smart Grid Communication Security
    Kong, Peng-Yong
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 41 - 54
  • [33] New Efficient Three-Party Quantum Key Distribution Protocols
    Shih, Han-Cheng
    Lee, Kuo-Chang
    Hwang, Tzonelih
    IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, 2009, 15 (06) : 1602 - 1606
  • [34] An experimental comparison of BB84 and SARG04 quantum key distribution protocols
    Jeong, Youn-Chang
    Kim, Yong-Su
    Kim, Yoon-Ho
    LASER PHYSICS LETTERS, 2014, 11 (09)
  • [35] Finite-key security analysis of quantum key distribution with imperfect light sources
    Mizutani, Akihiro
    Curty, Marcos
    Lim, Charles Ci Wen
    Imoto, Nobuyuki
    Tamaki, Kiyoshi
    NEW JOURNAL OF PHYSICS, 2015, 17
  • [36] Weak randomness seriously limits the security of quantum key distribution
    Bouda, Jan
    Pivoluska, Matej
    Plesch, Martin
    Wilmott, Colin
    PHYSICAL REVIEW A, 2012, 86 (06):
  • [37] SECURITY PROOF OF QUANTUM KEY DISTRIBUTION WITH DETECTION EFFICIENCY MISMATCH
    Fung, Chi-Hang Fred
    Tamaki, Kryoshi
    Qi, Bing
    Lo, Hoi-Kwong
    Ma, Xiongfeng
    QUANTUM INFORMATION & COMPUTATION, 2009, 9 (1-2) : 131 - 165
  • [38] Security of quantum-key-distribution protocol by using the post-selection technique
    Sekga, Comfort
    Mafu, Mhlambululi
    PHYSICS OPEN, 2021, 7
  • [39] Finite-key effects in multipartite quantum key distribution protocols
    Grasselli, Federico
    Kampermann, Hermann
    Bruss, Dagmar
    NEW JOURNAL OF PHYSICS, 2018, 20
  • [40] Security of quantum key distribution with iterative sifting
    Tamaki, Kiyoshi
    Lo, Hoi-Kwong
    Mizutani, Akihiro
    Kato, Go
    Lim, Charles Ci Wen
    Azuma, Koji
    Curty, Marcos
    QUANTUM SCIENCE AND TECHNOLOGY, 2018, 3 (01):