4.6 Article

Implementation vulnerabilities in general quantum cryptography

Journal

NEW JOURNAL OF PHYSICS
Volume 20, Issue -, Pages -

Publisher

IOP Publishing Ltd
DOI: 10.1088/1367-2630/aade06

Keywords

quantum cryptography; implementation security; quantum digital signature; quantum secret sharing; quantum random number generation; quantum secure direct communication; blind quantum computing

Funding

  1. NSERC of Canada
  2. Ontario MRIS
  3. National Natural Science Foundation of China [61632021]
  4. China Scholarship Council
  5. Carl Zeiss Foundation
  6. EPSRCUK Quantum Communication Hub [EP/M013472/1]
  7. EPSRC [EP/M013472/1] Funding Source: UKRI

Ask authors/readers for more resources

Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security of a quantum cryptographic system. This has been shown to happen for quantum key distribution. (QKD). Here we apply experience from implementation security of QKD to several other quantum cryptographic primitives. We survey quantum digital signatures, quantum secret sharing, source-independent quantum random number generation, quantum secure direct communication, and blind quantum computing. We propose how the eavesdropper could in principle exploit the loopholes to violate assumptions in these protocols, breaking their security properties. Applicable countermeasures are also discussed. It is important to consider potential implementation security issues early in protocol design, to shorten the path to future applications.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available