Publication: An approach for security evaluation and certification of a complete quantum communication system
Issued Date
2021-12-01
Resource Type
ISSN
20452322
Other identifier(s)
2-s2.0-85101992046
Rights
Mahidol University
Rights Holder(s)
SCOPUS
Bibliographic Citation
Scientific Reports. Vol.11, No.1 (2021)
Suggested Citation
Shihan Sajeed, Poompong Chaiwongkhot, Anqi Huang, Hao Qin, Vladimir Egorov, Anton Kozubov, Andrei Gaidash, Vladimir Chistiakov, Artur Vasiliev, Artur Gleim, Vadim Makarov An approach for security evaluation and certification of a complete quantum communication system. Scientific Reports. Vol.11, No.1 (2021). doi:10.1038/s41598-021-84139-3 Retrieved from: https://repository.li.mahidol.ac.th/handle/20.500.14594/79262
Research Projects
Organizational Units
Authors
Journal Issue
Thesis
Title
An approach for security evaluation and certification of a complete quantum communication system
Other Contributor(s)
Hefei National Laboratory for Physical Sciences at the Microscale
Saint Petersburg National Research University of Information Technologies, Mechanics and Optics University ITMO
National University of Defense Technology
Chinese Academy of Sciences
University of Toronto
University of Waterloo
Mahidol University
Quantum Technology Foundation (Thailand)
Saint Petersburg National Research University of Information Technologies, Mechanics and Optics University ITMO
National University of Defense Technology
Chinese Academy of Sciences
University of Toronto
University of Waterloo
Mahidol University
Quantum Technology Foundation (Thailand)
Abstract
Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises the known system implementation imperfections by hardness of protection and practical risk. Next, an initial analysis report lists all potential loopholes in its quantum-optical part. It is followed by interactions with the system manufacturer, testing and patching most loopholes, and re-assessing their status. Our protocol has been applied on multiple commercial quantum key distribution systems to improve their security. A detailed description of our methodology is presented with the example of a subcarrier-wave system. Our protocol is a step towards future security evaluation and security certification standards.