scholarly journals Passive scheme with a photon-number-resolving detector for monitoring the untrusted source in a plug-and-play quantum-key-distribution system

2010 ◽  
Vol 82 (4) ◽  
Author(s):  
Bingjie Xu ◽  
Xiang Peng ◽  
Hong Guo
2012 ◽  
Vol 12 (7&8) ◽  
pp. 630-647
Author(s):  
Bingjie Xu ◽  
Xiang Peng ◽  
Hong Guo

The SARG04 protocol is one of the most frequently used protocol in commercial plug-and-play quantum key distribution (QKD) system, where an eavesdropper can completely control or change the photon number statistics of the QKD source. To ensure the security of SARG04 protocol in plug-and-play QKD system with an unknown and untrusted source, the bounds of a few statistical parameters of the source need to be monitored. An active or a passive source monitor schemes are proposed to verify these parameters. Furthermore, the practical issues due to statistical fluctuation and detection noise in the source monitoring process are quantitatively analyzed. Our simulation results show that the passive scheme can be efficiently applied to plug-and-play system with SARG04 protocol.


2003 ◽  
Vol 83 (9) ◽  
pp. 1692-1694 ◽  
Author(s):  
Chunyuan Zhou ◽  
Guang Wu ◽  
Xiuliang Chen ◽  
Heping Zeng

Author(s):  
Ryan D Engle ◽  
Logan O Mailloux ◽  
Michael R Grimaila ◽  
Douglas D Hodson ◽  
Colin V McLaughlin ◽  
...  

Quantum Key Distribution (QKD) is an emerging cybersecurity technology that exploits the laws of quantum mechanics to generate unconditionally secure symmetric cryptographic keying material. The unique nature of QKD shows promise for high-security environments such as those found in banking, government, and the military. However, QKD systems often have implementation non-idealities that can negatively impact their performance and security. This article describes the development of a system-level model designed to study implementation non-idealities in commercially available decoy state enabled QKD systems. Specifically, this paper provides a detailed discussion of the decoy state protocol, its implementation, and its usage to detect sophisticated attacks, such as the photon number splitting attack. In addition, this work suggests an efficient and repeatable systems engineering methodology for understanding and studying communications protocols, architectures, operational configurations, and implementation tradeoffs in complex cyber systems.


Sign in / Sign up

Export Citation Format

Share Document