Abstract
Quantum key distribution (QKD) is poised to be the first widespread implementation of quantum communication. In principle, it offers unconditional security: an eavesdropper introduces errors and thus cannot remain concealed from the legitimate parties. However, in practical implementations the actual security depends on a host of technological and protocol-operational components. Eve could exploit imperfections in Alice’s or Bob’s equipment (such as source or detectors) remotely, or vulnerabilities in the actual implementation of the abstract QKD protocol. Several such attacks have been proposed [1,2], and various proof-of-principle demonstrations on commercial QKD devices have been performed in recent years [3–5].
© 2011 Optical Society of America
PDF ArticleMore Like This
Paul Jouguet, Sébastien Kunz-Jacques, and Eleni Diamanti
QW3A.5 Quantum Information and Measurement (QIM) 2014
Nathan Walk, Timothy C. Ralph, Thomas Symul, and Ping Koy Lam
JTuC4 CLEO: Applications and Technology (CLEO:A&T) 2011
Birgit Stiller, Imran Khan, Nitin Jain, Paul Jouguet, Sebastien Kunz-Jacques, Eleni Diamanti, Christoph Marquardt, and Gerd Leuchs
FF1A.7 CLEO: QELS_Fundamental Science (CLEO:FS) 2015