Implementation Security Certification of Decoy-BB84 Quantum Key Distribution Systems

7Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

One of the most important obstacles for the social deployment of Quantum Key Distribution (QKD) systems is the lack of standards for security certification. Proper selection of application will circumvent other obstacles, such as cost, key generation distance, and rate. Nevertheless, security certification of real systems, or “implementation security certification” is indispensable. Such certification should be clear and tractable for non-experts and should be performed with standardized characterization methods. Otherwise, the potential users cannot adopt the QKD system with confidence, because the highest level of security is what QKD appeals. This report discusses the process of the implementation security certification and the requirements for device characterization. It also presents several case studies on the requirements and experimental characterization of QKD devices for the security certification.

Cite

CITATION STYLE

APA

Tomita, A. (2019, June 1). Implementation Security Certification of Decoy-BB84 Quantum Key Distribution Systems. Advanced Quantum Technologies. Wiley-VCH Verlag. https://doi.org/10.1002/qute.201900005

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free