The black paper of quantum cryptography: real implementation problems
From MaRDI portal
(Redirected from Publication:477167)
Abstract: The laws of physics play a crucial role in the security of quantum key distribution (QKD). This fact has often been misunderstood as if the security of QKD would be based only on the laws of physics. As the experts know well, things are more subtle. We review the progresses in practical QKD focusing on (I) the elements of trust that are common to classical and quantum implementations of key distribution; and (II) some threats to security that have been highlighted recently, none of which is unredeemable (i.e., in principle QKD can be made secure). This leads us to guess that the field, similar to non-quantum modern cryptography, is going to split in two directions: those who pursue practical devices may have to moderate their security claims; those who pursue ultimate security may have to suspend their claims of usefulness.
Recommendations
Cites work
- scientific article; zbMATH DE number 5320407 (Why is no real title available?)
- A proof of the security of quantum key distribution
- Encyclopedia of Complexity and Systems Science
- Experimental quantum cryptography.
- Quantum cryptography
- Quantum cryptography based on Bell’s theorem
- Security of quantum key distribution with imperfect devices
- Security proof of quantum key distribution with detection efficiency mismatch
- Unconditional security in quantum cryptography
- Using quantum key distribution for cryptographic purposes: a survey
Cited in
(8)- Quantum cryptography and security analysis
- Process estimation in qubit systems: a quantum decision theory approach
- A less known side of quantum cryptography
- Quantum mechanics braces for the ultimate test
- The relevance of quantum cryptography in modern networking systems
- Upconversion-based receivers for quantum hacking-resistant quantum key distribution
- Joint eavesdropping on the BB84 decoy state protocol with an arbitrary passive light-source side channel
- Quantum cryptography: key distribution and beyond
This page was built for publication: The black paper of quantum cryptography: real implementation problems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q477167)