Publication: An approach for security evaluation and certification of a complete quantum communication system
dc.contributor.author | Shihan Sajeed | en_US |
dc.contributor.author | Poompong Chaiwongkhot | en_US |
dc.contributor.author | Anqi Huang | en_US |
dc.contributor.author | Hao Qin | en_US |
dc.contributor.author | Vladimir Egorov | en_US |
dc.contributor.author | Anton Kozubov | en_US |
dc.contributor.author | Andrei Gaidash | en_US |
dc.contributor.author | Vladimir Chistiakov | en_US |
dc.contributor.author | Artur Vasiliev | en_US |
dc.contributor.author | Artur Gleim | en_US |
dc.contributor.author | Vadim Makarov | en_US |
dc.contributor.other | Hefei National Laboratory for Physical Sciences at the Microscale | en_US |
dc.contributor.other | Saint Petersburg National Research University of Information Technologies, Mechanics and Optics University ITMO | en_US |
dc.contributor.other | National University of Defense Technology | en_US |
dc.contributor.other | Chinese Academy of Sciences | en_US |
dc.contributor.other | University of Toronto | en_US |
dc.contributor.other | University of Waterloo | en_US |
dc.contributor.other | Mahidol University | en_US |
dc.contributor.other | Quantum Technology Foundation (Thailand) | en_US |
dc.date.accessioned | 2022-08-04T11:39:00Z | |
dc.date.available | 2022-08-04T11:39:00Z | |
dc.date.issued | 2021-12-01 | en_US |
dc.description.abstract | Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises the known system implementation imperfections by hardness of protection and practical risk. Next, an initial analysis report lists all potential loopholes in its quantum-optical part. It is followed by interactions with the system manufacturer, testing and patching most loopholes, and re-assessing their status. Our protocol has been applied on multiple commercial quantum key distribution systems to improve their security. A detailed description of our methodology is presented with the example of a subcarrier-wave system. Our protocol is a step towards future security evaluation and security certification standards. | en_US |
dc.identifier.citation | Scientific Reports. Vol.11, No.1 (2021) | en_US |
dc.identifier.doi | 10.1038/s41598-021-84139-3 | en_US |
dc.identifier.issn | 20452322 | en_US |
dc.identifier.other | 2-s2.0-85101992046 | en_US |
dc.identifier.uri | https://repository.li.mahidol.ac.th/handle/20.500.14594/79262 | |
dc.rights | Mahidol University | en_US |
dc.rights.holder | SCOPUS | en_US |
dc.source.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85101992046&origin=inward | en_US |
dc.subject | Multidisciplinary | en_US |
dc.title | An approach for security evaluation and certification of a complete quantum communication system | en_US |
dc.type | Article | en_US |
dspace.entity.type | Publication | |
mu.datasource.scopus | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85101992046&origin=inward | en_US |