The black paper of quantum cryptography: real implementation problems
From MaRDI portal
Publication:477167
DOI10.1016/J.TCS.2014.09.015zbMATH Open1306.81034DBLPjournals/tcs/ScaraniK14arXiv0906.4547OpenAlexW2591579911WikidataQ59436239 ScholiaQ59436239MaRDI QIDQ477167FDOQ477167
Authors: Valerio Scarani, Christian Kurtsiefer
Publication date: 2 December 2014
Published in: Theoretical Computer Science (Search for Journal in Brave)
Abstract: The laws of physics play a crucial role in the security of quantum key distribution (QKD). This fact has often been misunderstood as if the security of QKD would be based only on the laws of physics. As the experts know well, things are more subtle. We review the progresses in practical QKD focusing on (I) the elements of trust that are common to classical and quantum implementations of key distribution; and (II) some threats to security that have been highlighted recently, none of which is unredeemable (i.e., in principle QKD can be made secure). This leads us to guess that the field, similar to non-quantum modern cryptography, is going to split in two directions: those who pursue practical devices may have to moderate their security claims; those who pursue ultimate security may have to suspend their claims of usefulness.
Full work available at URL: https://arxiv.org/abs/0906.4547
Recommendations
Cites Work
- Quantum cryptography based on Bell’s theorem
- Experimental quantum cryptography.
- Unconditional security in quantum cryptography
- Security of quantum key distribution with imperfect devices
- Quantum cryptography
- Encyclopedia of Complexity and Systems Science
- Title not available (Why is that?)
- Security proof of quantum key distribution with detection efficiency mismatch
- Using quantum key distribution for cryptographic purposes: a survey
- A proof of the security of quantum key distribution
Cited In (8)
- A less known side of quantum cryptography
- Process estimation in qubit systems: a quantum decision theory approach
- Quantum mechanics braces for the ultimate test
- The relevance of quantum cryptography in modern networking systems
- Upconversion-based receivers for quantum hacking-resistant quantum key distribution
- Joint eavesdropping on the BB84 decoy state protocol with an arbitrary passive light-source side channel
- Quantum cryptography: key distribution and beyond
- Quantum cryptography and security analysis
This page was built for publication: The black paper of quantum cryptography: real implementation problems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q477167)