Publication:
An approach for security evaluation and certification of a complete quantum communication system

dc.contributor.authorShihan Sajeeden_US
dc.contributor.authorPoompong Chaiwongkhoten_US
dc.contributor.authorAnqi Huangen_US
dc.contributor.authorHao Qinen_US
dc.contributor.authorVladimir Egoroven_US
dc.contributor.authorAnton Kozuboven_US
dc.contributor.authorAndrei Gaidashen_US
dc.contributor.authorVladimir Chistiakoven_US
dc.contributor.authorArtur Vasilieven_US
dc.contributor.authorArtur Gleimen_US
dc.contributor.authorVadim Makaroven_US
dc.contributor.otherHefei National Laboratory for Physical Sciences at the Microscaleen_US
dc.contributor.otherSaint Petersburg National Research University of Information Technologies, Mechanics and Optics University ITMOen_US
dc.contributor.otherNational University of Defense Technologyen_US
dc.contributor.otherChinese Academy of Sciencesen_US
dc.contributor.otherUniversity of Torontoen_US
dc.contributor.otherUniversity of Waterlooen_US
dc.contributor.otherMahidol Universityen_US
dc.contributor.otherQuantum Technology Foundation (Thailand)en_US
dc.date.accessioned2022-08-04T11:39:00Z
dc.date.available2022-08-04T11:39:00Z
dc.date.issued2021-12-01en_US
dc.description.abstractAlthough quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The protocol subdivides a system by defining seven system implementation sub-layers based on a hierarchical order of information flow; then it categorises the known system implementation imperfections by hardness of protection and practical risk. Next, an initial analysis report lists all potential loopholes in its quantum-optical part. It is followed by interactions with the system manufacturer, testing and patching most loopholes, and re-assessing their status. Our protocol has been applied on multiple commercial quantum key distribution systems to improve their security. A detailed description of our methodology is presented with the example of a subcarrier-wave system. Our protocol is a step towards future security evaluation and security certification standards.en_US
dc.identifier.citationScientific Reports. Vol.11, No.1 (2021)en_US
dc.identifier.doi10.1038/s41598-021-84139-3en_US
dc.identifier.issn20452322en_US
dc.identifier.other2-s2.0-85101992046en_US
dc.identifier.urihttps://repository.li.mahidol.ac.th/handle/20.500.14594/79262
dc.rightsMahidol Universityen_US
dc.rights.holderSCOPUSen_US
dc.source.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85101992046&origin=inwarden_US
dc.subjectMultidisciplinaryen_US
dc.titleAn approach for security evaluation and certification of a complete quantum communication systemen_US
dc.typeArticleen_US
dspace.entity.typePublication
mu.datasource.scopushttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85101992046&origin=inwarden_US

Files

Collections