作者: S. Schauer
DOI: 10.1007/978-3-642-04831-9_5
关键词: Attack strategy 、 Physical limitations 、 Quantum entanglement 、 Quantum key distribution 、 Computer science 、 Quantum cryptography 、 Computer security 、 Secure communication
摘要: In the following we will describe a number of different attack strategies on Quantum Key Distribution protocols. First, discuss QKD protocols based ideal sources, mainly using single photons as in [2, 1, 11] but also entanglement-based as, for example, [15]. Additionally, deal with security realistic environments they are described Chap. 6. Regarding due to physical limitations apparatus some loopholes were identified, which could lead successful such As see, special countermeasures implemented close those and guarantee an unconditional secure communication.