{"title":"通过机器学习自动识别实用量子密钥分发系统中的缺陷和攻击","authors":"Jiaxin Xu, Xiao Ma, Jingyang Liu, Chunhui Zhang, Hongwei Li, Xingyu Zhou, Qin Wang","doi":"10.1007/s11432-023-3988-x","DOIUrl":null,"url":null,"abstract":"<p>The realistic security of quantum key distribution (QKD) systems is currently a hot research topic in the field of quantum communications. There are always defects in practical devices, and eavesdroppers can make use of the security risk points of various devices to obtain key information. To date, current types of security analysis tend to analyze each security risk point individually, thereby posing great challenges for the overall security evaluation of QKD systems. In this paper, for the first time, we employ machine learning algorithms to identify the defects of different devices and certain attacks in real time, with an accuracy of 98%. It provides a novel solution for the practical security evaluation of QKD systems, thereby addressing the bottleneck problem of multiple risk points being difficult to address simultaneously in QKD systems, thus paving the way for the future large-scale application of quantum communication networks.</p>","PeriodicalId":21618,"journal":{"name":"Science China Information Sciences","volume":"2010 1","pages":""},"PeriodicalIF":7.3000,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Automatically identifying imperfections and attacks in practical quantum key distribution systems via machine learning\",\"authors\":\"Jiaxin Xu, Xiao Ma, Jingyang Liu, Chunhui Zhang, Hongwei Li, Xingyu Zhou, Qin Wang\",\"doi\":\"10.1007/s11432-023-3988-x\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The realistic security of quantum key distribution (QKD) systems is currently a hot research topic in the field of quantum communications. There are always defects in practical devices, and eavesdroppers can make use of the security risk points of various devices to obtain key information. To date, current types of security analysis tend to analyze each security risk point individually, thereby posing great challenges for the overall security evaluation of QKD systems. In this paper, for the first time, we employ machine learning algorithms to identify the defects of different devices and certain attacks in real time, with an accuracy of 98%. It provides a novel solution for the practical security evaluation of QKD systems, thereby addressing the bottleneck problem of multiple risk points being difficult to address simultaneously in QKD systems, thus paving the way for the future large-scale application of quantum communication networks.</p>\",\"PeriodicalId\":21618,\"journal\":{\"name\":\"Science China Information Sciences\",\"volume\":\"2010 1\",\"pages\":\"\"},\"PeriodicalIF\":7.3000,\"publicationDate\":\"2024-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Science China Information Sciences\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s11432-023-3988-x\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Science China Information Sciences","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11432-023-3988-x","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Automatically identifying imperfections and attacks in practical quantum key distribution systems via machine learning
The realistic security of quantum key distribution (QKD) systems is currently a hot research topic in the field of quantum communications. There are always defects in practical devices, and eavesdroppers can make use of the security risk points of various devices to obtain key information. To date, current types of security analysis tend to analyze each security risk point individually, thereby posing great challenges for the overall security evaluation of QKD systems. In this paper, for the first time, we employ machine learning algorithms to identify the defects of different devices and certain attacks in real time, with an accuracy of 98%. It provides a novel solution for the practical security evaluation of QKD systems, thereby addressing the bottleneck problem of multiple risk points being difficult to address simultaneously in QKD systems, thus paving the way for the future large-scale application of quantum communication networks.
期刊介绍:
Science China Information Sciences is a dedicated journal that showcases high-quality, original research across various domains of information sciences. It encompasses Computer Science & Technologies, Control Science & Engineering, Information & Communication Engineering, Microelectronics & Solid-State Electronics, and Quantum Information, providing a platform for the dissemination of significant contributions in these fields.