Your browser doesn't support javascript.
loading
An approach for security evaluation and certification of a complete quantum communication system.
Sajeed, Shihan; Chaiwongkhot, Poompong; Huang, Anqi; Qin, Hao; Egorov, Vladimir; Kozubov, Anton; Gaidash, Andrei; Chistiakov, Vladimir; Vasiliev, Artur; Gleim, Artur; Makarov, Vadim.
Afiliação
  • Sajeed S; Institute for Quantum Computing, University of Waterloo, Waterloo, ON, N2L 3G1, Canada. shihan.sajeed@gmail.com.
  • Chaiwongkhot P; Department of Physics and Astronomy, University of Waterloo, Waterloo, ON, N2L 3G1, Canada. shihan.sajeed@gmail.com.
  • Huang A; Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, N2L 3G1, Canada. shihan.sajeed@gmail.com.
  • Qin H; Department of Electrical and Computer Engineering, University of Toronto, Toronto, M5S 3G4, Canada. shihan.sajeed@gmail.com.
  • Egorov V; Institute for Quantum Computing, University of Waterloo, Waterloo, ON, N2L 3G1, Canada.
  • Kozubov A; Department of Physics and Astronomy, University of Waterloo, Waterloo, ON, N2L 3G1, Canada.
  • Gaidash A; Department of Physics, Faculty of Science, Mahidol University, Bangkok, 10400, Thailand.
  • Chistiakov V; Quantum Technology Foundation (Thailand), Bangkok, 10110, Thailand.
  • Vasiliev A; Institute for Quantum Computing, University of Waterloo, Waterloo, ON, N2L 3G1, Canada.
  • Gleim A; Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, N2L 3G1, Canada.
  • Makarov V; Institute for Quantum Information and State Key Laboratory of High Performance Computing, College of Computer Science and Technology, National University of Defense Technology, Changsha, 410073, People's Republic of China.
Sci Rep ; 11(1): 5110, 2021 Mar 03.
Article em En | MEDLINE | ID: mdl-33658528
ABSTRACT
Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises the known system implementation imperfections by hardness of protection and practical risk. Next, an initial analysis report lists all potential loopholes in its quantum-optical part. It is followed by interactions with the system manufacturer, testing and patching most loopholes, and re-assessing their status. Our protocol has been applied on multiple commercial quantum key distribution systems to improve their security. A detailed description of our methodology is presented with the example of a subcarrier-wave system. Our protocol is a step towards future security evaluation and security certification standards.

Texto completo: 1 Coleções: 01-internacional Base de dados: MEDLINE Tipo de estudo: Guideline Idioma: En Revista: Sci Rep Ano de publicação: 2021 Tipo de documento: Article País de afiliação: Canadá

Texto completo: 1 Coleções: 01-internacional Base de dados: MEDLINE Tipo de estudo: Guideline Idioma: En Revista: Sci Rep Ano de publicação: 2021 Tipo de documento: Article País de afiliação: Canadá