Quantum key distribution with hacking countermeasures and long term field trial

Abstract Quantum key distribution’s (QKD’s) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical m...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: A. R. Dixon, J. F. Dynes, M. Lucamarini, B. Fröhlich, A. W. Sharpe, A. Plews, W. Tam, Z. L. Yuan, Y. Tanizawa, H. Sato, S. Kawamura, M. Fujiwara, M. Sasaki, A. J. Shields
Formato: article
Lenguaje:EN
Publicado: Nature Portfolio 2017
Materias:
R
Q
Acceso en línea:https://doaj.org/article/d529a9fa934d4bddb9d05fee8bc22f1b
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:d529a9fa934d4bddb9d05fee8bc22f1b
record_format dspace
spelling oai:doaj.org-article:d529a9fa934d4bddb9d05fee8bc22f1b2021-12-02T11:40:50ZQuantum key distribution with hacking countermeasures and long term field trial10.1038/s41598-017-01884-02045-2322https://doaj.org/article/d529a9fa934d4bddb9d05fee8bc22f1b2017-05-01T00:00:00Zhttps://doi.org/10.1038/s41598-017-01884-0https://doaj.org/toc/2045-2322Abstract Quantum key distribution’s (QKD’s) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.A. R. DixonJ. F. DynesM. LucamariniB. FröhlichA. W. SharpeA. PlewsW. TamZ. L. YuanY. TanizawaH. SatoS. KawamuraM. FujiwaraM. SasakiA. J. ShieldsNature PortfolioarticleMedicineRScienceQENScientific Reports, Vol 7, Iss 1, Pp 1-9 (2017)
institution DOAJ
collection DOAJ
language EN
topic Medicine
R
Science
Q
spellingShingle Medicine
R
Science
Q
A. R. Dixon
J. F. Dynes
M. Lucamarini
B. Fröhlich
A. W. Sharpe
A. Plews
W. Tam
Z. L. Yuan
Y. Tanizawa
H. Sato
S. Kawamura
M. Fujiwara
M. Sasaki
A. J. Shields
Quantum key distribution with hacking countermeasures and long term field trial
description Abstract Quantum key distribution’s (QKD’s) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.
format article
author A. R. Dixon
J. F. Dynes
M. Lucamarini
B. Fröhlich
A. W. Sharpe
A. Plews
W. Tam
Z. L. Yuan
Y. Tanizawa
H. Sato
S. Kawamura
M. Fujiwara
M. Sasaki
A. J. Shields
author_facet A. R. Dixon
J. F. Dynes
M. Lucamarini
B. Fröhlich
A. W. Sharpe
A. Plews
W. Tam
Z. L. Yuan
Y. Tanizawa
H. Sato
S. Kawamura
M. Fujiwara
M. Sasaki
A. J. Shields
author_sort A. R. Dixon
title Quantum key distribution with hacking countermeasures and long term field trial
title_short Quantum key distribution with hacking countermeasures and long term field trial
title_full Quantum key distribution with hacking countermeasures and long term field trial
title_fullStr Quantum key distribution with hacking countermeasures and long term field trial
title_full_unstemmed Quantum key distribution with hacking countermeasures and long term field trial
title_sort quantum key distribution with hacking countermeasures and long term field trial
publisher Nature Portfolio
publishDate 2017
url https://doaj.org/article/d529a9fa934d4bddb9d05fee8bc22f1b
work_keys_str_mv AT ardixon quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT jfdynes quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT mlucamarini quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT bfrohlich quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT awsharpe quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT aplews quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT wtam quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT zlyuan quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT ytanizawa quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT hsato quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT skawamura quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT mfujiwara quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT msasaki quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
AT ajshields quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial
_version_ 1718395548389605376