 |
Work Item Reference |
ETSI Doc. Number |
STF |
Technical Body in Charge |
Standard Not Ready For Download
|
|
|
DGS/QKD-0010_ISTrojan
|
GS QKD 010
|
|
QKD
|
| |
Current Status (Click to View Full Schedule) |
Latest Version
|
Cover Date |
Standstill |
Creation Date |
| |
Stable draft (2025-06-03)
|
0.6.1 Draft
|
|
View Standstill Information
|
2013-11-10
|
| |
Rapporteur |
Technical Officer |
Harmonised Standard |
|
| |
Martin Ward
|
Carmine Rizzo
|
No
|
|
| |
|
Title
|
Quantum Key Distribution (QKD) Implementation security: protection against Trojan horse attacks Implementation security against Trojan horse
|
Scope and Field of Application
|
The present document addresses aspects of the design, construction, characterisation and operation of QKD systems that protect against Trojan horse attacks. Requirements relate to formal security analyses and the privacy amplification that needs to be applied to a real system. Measurement methods are described to characterise real systems. Examples focus on one-way weak-laser-pulse Mach-Zender QKD systems with decoy states. Many of the ideas considered can be applied in the analysis of other system types.
|
Supporting Organizations
|
BIS, TOSHIBA RESEARCH EUROPE LTD, Institut Telecom, AIT, University of Waterloo
|