Abstract

Quantum key distribution (QKD) offers information-theoretical security, while real systems are thought not to promise practical security effectively. In the practical continuous-variable (CV) QKD system, the deviations between realistic devices and idealized models might introduce vulnerabilities for eavesdroppers and stressors for two parties. However, the common quantum hacking strategies and countermeasures inevitably increase the complexity of practical CV systems. Machine-learning techniques are utilized to explore how to perceive practical imperfections. Here, we review recent works on secure CVQKD systems with machine learning, where the methods for detections and attacks were studied.

Highlights

  • Quantum key distribution (QKD) is an unconditionally secure quantum communication technology to transmit secure keys between the authorized sender (Alice) and receiver (Bob)

  • The Gaussian-modulated coherent state (GMCS) protocol is one of the most favorable CVQKD schemes to date, which in theory has been proven secure against arbitrary collective attacks and coherent attacks based on some basic assumptions [7]

  • We discussed how to perceive the imperfections of devices with machine-learning techniques in practical CVQKD systems

Read more

Summary

Introduction

Quantum key distribution (QKD) is an unconditionally secure quantum communication technology to transmit secure keys between the authorized sender (Alice) and receiver (Bob). There are security loopholes exposed by the imperfect devices for Eve to successfully steal secret key information, which is an effective quantum hacking strategy These various attacks are against various components such as sources, detectors, and channels. Reference [30] employed a backpropagation neural network to adjust the modulation variance to an optimal value and to furnish a higher achievable key rate and a more efficient parameter optimization than the local search algorithm in the practical four-state CVQKD system. Based on these schemes, the efficient performance of machine learning for secure communication in the CVQKD system has been confirmed.

Protocol
Security Analysis
Quantum Hacking Attacks and Countermeasures with Machine Learning
Countermeasures on Multiple Attacks
Quantum Hacking with Machine Learning
Findings
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.