2017
DOI: 10.1177/1548512917698053
|View full text |Cite
|
Sign up to set email alerts
|

Implementing the decoy state protocol in a practically oriented Quantum Key Distribution system-level model

Abstract: Quantum Key Distribution (QKD) is an emerging cybersecurity technology that exploits the laws of quantum mechanics to generate unconditionally secure symmetric cryptographic keying material. The unique nature of QKD shows promise for high-security environments such as those found in banking, government, and the military. However, QKD systems often have implementation non-idealities that can negatively impact their performance and security. This article describes the development of a system-level model designed… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 37 publications
(94 reference statements)
0
10
0
Order By: Relevance
“…The first increment provided a hardware-focused QKD notional architecture built in a modular fashion from a library of optical and electro-optical components with probabilistic weak coherent optical pulses [6]. The second increment added the processes and logic required to execute the decoy state protocol [7,60]. In the third increment, the behaviors of several modeled components were extended to properly handle the propagation of photon number specific representations of optical pulses (i.e., Fock states) and the PNS attack was fully implemented [9].…”
Section: Research Modelmentioning
confidence: 99%
“…The first increment provided a hardware-focused QKD notional architecture built in a modular fashion from a library of optical and electro-optical components with probabilistic weak coherent optical pulses [6]. The second increment added the processes and logic required to execute the decoy state protocol [7,60]. In the third increment, the behaviors of several modeled components were extended to properly handle the propagation of photon number specific representations of optical pulses (i.e., Fock states) and the PNS attack was fully implemented [9].…”
Section: Research Modelmentioning
confidence: 99%
“…Splitting (PNS) attack against the QKD system. 23 The PNS attack is conducted by an adversarial eavesdropper, Eve, whose purpose is to gain knowledge of the generated secret key. Eve performs the PNS attack by stealing photons from each multiphoton pulse Alice generates while suppressing all single photon pulses.…”
Section: Decoy State Enabled Qkdmentioning
confidence: 99%
“…Additionally, Alice and Bob's individual processors had to be extended to perform analysis of signal and decoy qubit detection statistics to detect the presence of a PNS attack. 23…”
Section: Decoy State Enabled Qkdmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, it demonstrates the diversity and variety of executable simulations (i.e., QKD system configurations), and tests that have been created using the framework. For example, a notional polarization-based prepare and measure BB84 QKD system, 6 a decoy state QKD system, 19 a decoy state QKD system performance in the presence of eavesdropping, 20 and a photon number splitting attack 21 have been modeled.…”
Section: Quantum Key Distribution Background 21 Bb84-a Qkd Protocolmentioning
confidence: 99%