Preparing a commercial quantum key distribution system for certification against implementation loopholes
Issued Date
2024-10-01
Resource Type
eISSN
23317019
Scopus ID
2-s2.0-85208958683
Journal Title
Physical Review Applied
Volume
22
Issue
4
Rights Holder(s)
SCOPUS
Bibliographic Citation
Physical Review Applied Vol.22 No.4 (2024)
Suggested Citation
Makarov V., Abrikosov A., Chaiwongkhot P., Fedorov A.K., Huang A., Kiktenko E., Petrov M., Ponosova A., Ruzhitskaya D., Tayduganov A., Trefilov D., Zaitsev K. Preparing a commercial quantum key distribution system for certification against implementation loopholes. Physical Review Applied Vol.22 No.4 (2024). doi:10.1103/PhysRevApplied.22.044076 Retrieved from: https://repository.li.mahidol.ac.th/handle/20.500.14594/102096
Title
Preparing a commercial quantum key distribution system for certification against implementation loopholes
Author's Affiliation
Faculty of Science, Mahidol University
AtlanTTic, Spain
National University of Science & Technology (MISIS)
Steklov Mathematical Institute of RAS
Universidade de Vigo
National University of Defense Technology China
HSE University
University of Waterloo
QRate LLC
Quantum Technology Foundation (Thailand)
AtlanTTic, Spain
National University of Science & Technology (MISIS)
Steklov Mathematical Institute of RAS
Universidade de Vigo
National University of Defense Technology China
HSE University
University of Waterloo
QRate LLC
Quantum Technology Foundation (Thailand)
Corresponding Author(s)
Other Contributor(s)
Abstract
A commercial quantum key distribution (QKD) system needs to be formally certified to enable its wide deployment. The certification should include the system's robustness against known implementation loopholes and attacks that exploit them. Here we ready a fiber-optic QKD system for this procedure. The system has a prepare-and-measure scheme with decoy-state BB84 protocol, polarization encoding, a qubit source rate of 312.5 MHz, and is manufactured by QRate. We detail its hardware and postprocessing. We analyze the hardware for known implementation loopholes, search for possible new loopholes, and discuss countermeasures. We then amend the system design to address the highest-risk loopholes identified. We also work out technical requirements on the certification lab and outline its possible structure.