Quantum key distribution with hacking countermeasures and long term field trial
Abstract Quantum key distribution’s (QKD’s) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical m...
Guardado en:
Autores principales: | , , , , , , , , , , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Nature Portfolio
2017
|
Materias: | |
Acceso en línea: | https://doaj.org/article/d529a9fa934d4bddb9d05fee8bc22f1b |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:d529a9fa934d4bddb9d05fee8bc22f1b |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:d529a9fa934d4bddb9d05fee8bc22f1b2021-12-02T11:40:50ZQuantum key distribution with hacking countermeasures and long term field trial10.1038/s41598-017-01884-02045-2322https://doaj.org/article/d529a9fa934d4bddb9d05fee8bc22f1b2017-05-01T00:00:00Zhttps://doi.org/10.1038/s41598-017-01884-0https://doaj.org/toc/2045-2322Abstract Quantum key distribution’s (QKD’s) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.A. R. DixonJ. F. DynesM. LucamariniB. FröhlichA. W. SharpeA. PlewsW. TamZ. L. YuanY. TanizawaH. SatoS. KawamuraM. FujiwaraM. SasakiA. J. ShieldsNature PortfolioarticleMedicineRScienceQENScientific Reports, Vol 7, Iss 1, Pp 1-9 (2017) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Medicine R Science Q |
spellingShingle |
Medicine R Science Q A. R. Dixon J. F. Dynes M. Lucamarini B. Fröhlich A. W. Sharpe A. Plews W. Tam Z. L. Yuan Y. Tanizawa H. Sato S. Kawamura M. Fujiwara M. Sasaki A. J. Shields Quantum key distribution with hacking countermeasures and long term field trial |
description |
Abstract Quantum key distribution’s (QKD’s) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered. |
format |
article |
author |
A. R. Dixon J. F. Dynes M. Lucamarini B. Fröhlich A. W. Sharpe A. Plews W. Tam Z. L. Yuan Y. Tanizawa H. Sato S. Kawamura M. Fujiwara M. Sasaki A. J. Shields |
author_facet |
A. R. Dixon J. F. Dynes M. Lucamarini B. Fröhlich A. W. Sharpe A. Plews W. Tam Z. L. Yuan Y. Tanizawa H. Sato S. Kawamura M. Fujiwara M. Sasaki A. J. Shields |
author_sort |
A. R. Dixon |
title |
Quantum key distribution with hacking countermeasures and long term field trial |
title_short |
Quantum key distribution with hacking countermeasures and long term field trial |
title_full |
Quantum key distribution with hacking countermeasures and long term field trial |
title_fullStr |
Quantum key distribution with hacking countermeasures and long term field trial |
title_full_unstemmed |
Quantum key distribution with hacking countermeasures and long term field trial |
title_sort |
quantum key distribution with hacking countermeasures and long term field trial |
publisher |
Nature Portfolio |
publishDate |
2017 |
url |
https://doaj.org/article/d529a9fa934d4bddb9d05fee8bc22f1b |
work_keys_str_mv |
AT ardixon quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial AT jfdynes quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial AT mlucamarini quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial AT bfrohlich quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial AT awsharpe quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial AT aplews quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial AT wtam quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial AT zlyuan quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial AT ytanizawa quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial AT hsato quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial AT skawamura quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial AT mfujiwara quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial AT msasaki quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial AT ajshields quantumkeydistributionwithhackingcountermeasuresandlongtermfieldtrial |
_version_ |
1718395548389605376 |