One of the most important obstacles for the social deployment of Quantum Key Distribution (QKD) systems is the lack of standards for security certification. Proper selection of application will circumvent other obstacles, such as cost, key generation distance, and rate. Nevertheless, security certification of real systems, or “implementation security certification” is indispensable. Such certification should be clear and tractable for non-experts and should be performed with standardized characterization methods. Otherwise, the potential users cannot adopt the QKD system with confidence, because the highest level of security is what QKD appeals. This report discusses the process of the implementation security certification and the requirements for device characterization. It also presents several case studies on the requirements and experimental characterization of QKD devices for the security certification.
CITATION STYLE
Tomita, A. (2019, June 1). Implementation Security Certification of Decoy-BB84 Quantum Key Distribution Systems. Advanced Quantum Technologies. Wiley-VCH Verlag. https://doi.org/10.1002/qute.201900005
Mendeley helps you to discover research relevant for your work.