Jianzhou Mao, Guobin Xu, Eric Sakk, Shuangbao Paul Wang
{"title":"量子密钥分发与安全性研究","authors":"Jianzhou Mao, Guobin Xu, Eric Sakk, Shuangbao Paul Wang","doi":"10.1109/CSP58884.2023.00033","DOIUrl":null,"url":null,"abstract":"The current development of quantum computing threatens the security of conventional encryption algorithms such as RSA. In recent years, Quantum Key Distribution (QKD) has introduced to the world of information security a viable method that is anticipated to provide security protection against the threat of quantum computing. In this paper, we investigate the protocols of the QKD system. Next, we focus on an experimental study of quantum key distribution. A physical QKD system is leveraged to assist us in further investigating quantum key distribution processes. In our study, an eavesdropper was evaluated to analyze the impact on the QKD processes. In the experimental study results, the difference in key generation, exchange, and error rates between normal and attack scenarios can be observed.","PeriodicalId":255083,"journal":{"name":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Quantum Key Distribution and Security Studies\",\"authors\":\"Jianzhou Mao, Guobin Xu, Eric Sakk, Shuangbao Paul Wang\",\"doi\":\"10.1109/CSP58884.2023.00033\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The current development of quantum computing threatens the security of conventional encryption algorithms such as RSA. In recent years, Quantum Key Distribution (QKD) has introduced to the world of information security a viable method that is anticipated to provide security protection against the threat of quantum computing. In this paper, we investigate the protocols of the QKD system. Next, we focus on an experimental study of quantum key distribution. A physical QKD system is leveraged to assist us in further investigating quantum key distribution processes. In our study, an eavesdropper was evaluated to analyze the impact on the QKD processes. In the experimental study results, the difference in key generation, exchange, and error rates between normal and attack scenarios can be observed.\",\"PeriodicalId\":255083,\"journal\":{\"name\":\"2023 7th International Conference on Cryptography, Security and Privacy (CSP)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 7th International Conference on Cryptography, Security and Privacy (CSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSP58884.2023.00033\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 7th International Conference on Cryptography, Security and Privacy (CSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSP58884.2023.00033","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The current development of quantum computing threatens the security of conventional encryption algorithms such as RSA. In recent years, Quantum Key Distribution (QKD) has introduced to the world of information security a viable method that is anticipated to provide security protection against the threat of quantum computing. In this paper, we investigate the protocols of the QKD system. Next, we focus on an experimental study of quantum key distribution. A physical QKD system is leveraged to assist us in further investigating quantum key distribution processes. In our study, an eavesdropper was evaluated to analyze the impact on the QKD processes. In the experimental study results, the difference in key generation, exchange, and error rates between normal and attack scenarios can be observed.