Next Article in Journal
Tuning Guidelines for an Adaptive-Gain Parabolic Sliding Mode Filter
Next Article in Special Issue
Modeling and Solving the Three Seaside Operational Problems Using an Object-Oriented and Timed Predicate/Transition Net
Previous Article in Journal
Erratum: A CMOS Multiplied Input Differential Difference Amplifier: A New Active Device and Its Applications. Applied Sciences 2017, 7, 106
Previous Article in Special Issue
Manufacturing Scheduling Using Colored Petri Nets and Reinforcement Learning
Article Menu
Issue 2 (February) cover image

Export Article

Open AccessArticle
Appl. Sci. 2017, 7(2), 212; doi:10.3390/app7020212

Modeling, Simulation, and Performance Analysis of Decoy State Enabled Quantum Key Distribution Systems

1
Air Force Institute of Technology, Wright-Patterson AFB, OH 45433, USA
2
Naval Research Laboratory, Washington, DC 20375, USA
3
Laboratory for Telecommunication Sciences, College Park, MD 20740, USA
*
Author to whom correspondence should be addressed.
Academic Editors: Zhiwu Li, MengChu Zhou, Naiqi Wu and Yisheng Huang
Received: 26 December 2016 / Revised: 16 February 2017 / Accepted: 17 February 2017 / Published: 22 February 2017
(This article belongs to the Special Issue Modeling, Simulation, Operation and Control of Discrete Event Systems)
View Full-Text   |   Download PDF [4013 KB, uploaded 22 February 2017]   |  

Abstract

Quantum Key Distribution (QKD) systems exploit the laws of quantum mechanics to generate secure keying material for cryptographic purposes. To date, several commercially viable decoy state enabled QKD systems have been successfully demonstrated and show promise for high-security applications such as banking, government, and military environments. In this work, a detailed performance analysis of decoy state enabled QKD systems is conducted through model and simulation of several common decoy state configurations. The results of this study uniquely demonstrate that the decoy state protocol can ensure Photon Number Splitting (PNS) attacks are detected with high confidence, while maximizing the system’s quantum throughput at no additional cost. Additionally, implementation security guidance is provided for QKD system developers and users. View Full-Text
Keywords: quantum key distribution; decoy state protocol; photon number splitting attack; implementation security quantum key distribution; decoy state protocol; photon number splitting attack; implementation security
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Mailloux, L.O.; Grimaila, M.R.; Hodson, D.D.; Engle, R.; McLaughlin, C.; Baumgartner, G. Modeling, Simulation, and Performance Analysis of Decoy State Enabled Quantum Key Distribution Systems. Appl. Sci. 2017, 7, 212.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Appl. Sci. EISSN 2076-3417 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top