LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Implementation vulnerabilities in general quantum cryptography

Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security… Click to show full abstract

Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security of a quantum cryptographic system. This has been shown to happen for quantum key distribution (QKD). Here we apply experience from implementation security of QKD to other quantum cryptographic primitives: quantum digital signatures, quantum secret sharing, source-independent quantum random number generation, quantum secure direct communication, and blind quantum computing. For each implementation, potential loopholes are pointed out. We explain how the eavesdropper could in principle exploit the loopholes to violate assumptions in the protocols, breaking their security properties. Countermeasures are also discussed. It is important to consider potential implementation security issues early in protocol design, to shorten the path to future applications.

Keywords: quantum; implementation; quantum cryptography; security; implementation vulnerabilities

Journal Title: New Journal of Physics
Year Published: 2018

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.