IDEAS home Printed from https://ideas.repec.org/p/ime/imedps/25-e-03.html
   My bibliography  Save this paper

Advance in Security Proofs of Quantum Key Distribution and Its Challenges towards Practical Implementation

Author

Listed:
  • Kazutoshi Kan

    (Director, Institute for Monetary and Economic Studies, Bank of Japan (E-mail: kazutoshi.kan@boj.or.jp))

  • Toshihiko Sasaki

    (Lecturer, The University of Tokyo (currently Quantinuum K.K., E-mail: toshihiko.sasaki@quantinuum.com))

Abstract

This paper provides an overview of advancements in the security proof of quantum key distribution (QKD) while discussing the rationale and challenges of its practical implementation. QKD ensures information-theoretic security, meaning even eavesdroppers with unlimited computational power cannot decipher the transmitted data. As a result, it is resilient against various attacks, including eavesdropping and harvest-now-decrypt-later attacks strategies, where ciphertext is stored for future decryption attempts. QKD encompasses a range of methodologies, each supported by corresponding security proofs. Since the introduction of the first QKD protocol, BB84, in 1984, significant theoretical progress has been made to address evolving technologies and counter implementation attacks that exploit device imperfections. In 2020, the first security proof for continuous-variable QKD (CV-QKD) was established. This method offers greater compatibility with existing optical fiber networks. Despite its advantages, QKD requires specialized devices, resulting in high costs for network construction. Currently, QKD is primarily suitable for transmitting highly confidential information across multiple hubs. To encourage its adoption, several challenges must be addressed, including advancing quantum relay technologies, enhancing performance, establishing protocol standards, and creating institutional frameworks for verifying and certifying device security.

Suggested Citation

  • Kazutoshi Kan & Toshihiko Sasaki, 2025. "Advance in Security Proofs of Quantum Key Distribution and Its Challenges towards Practical Implementation," IMES Discussion Paper Series 25-E-03, Institute for Monetary and Economic Studies, Bank of Japan.
  • Handle: RePEc:ime:imedps:25-e-03
    as

    Download full text from publisher

    File URL: https://www.imes.boj.or.jp/research/papers/english/25-E-03.pdf
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Takaya Matsuura & Kento Maeda & Toshihiko Sasaki & Masato Koashi, 2021. "Finite-size security of continuous-variable quantum key distribution with digital signal processing," Nature Communications, Nature, vol. 12(1), pages 1-13, December.
    2. Frédéric Grosshans & Gilles Van Assche & Jérôme Wenger & Rosa Brouri & Nicolas J. Cerf & Philippe Grangier, 2003. "Quantum key distribution using gaussian-modulated coherent states," Nature, Nature, vol. 421(6920), pages 238-241, January.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Yiwu Zhu & Lei Mao & Hui Hu & Yijun Wang & Ying Guo, 2022. "Adaptive Continuous-Variable Quantum Key Distribution with Discrete Modulation Regulative in Free Space," Mathematics, MDPI, vol. 10(23), pages 1-8, November.
    2. Nitin Jain & Hou-Man Chin & Hossein Mani & Cosmo Lupo & Dino Solar Nikolic & Arne Kordts & Stefano Pirandola & Thomas Brochmann Pedersen & Matthias Kolb & Bernhard Ömer & Christoph Pacher & Tobias Geh, 2022. "Practical continuous-variable quantum key distribution with composable security," Nature Communications, Nature, vol. 13(1), pages 1-8, December.
    3. Zhiyue Zuo & Wenqi Peng & Hui Xian & Wenqi Jiang & Hao Luo & Sha Xiong & Ying Guo, 2023. "Suppression of Fading Noise in Satellite-Mediated Continuous-Variable Quantum Key Distribution via Clusterization," Mathematics, MDPI, vol. 11(16), pages 1-13, August.
    4. Hung-Wen Wang & Chia-Wei Tsai & Jason Lin & Yu-Yun Huang & Chun-Wei Yang, 2022. "Efficient and Secure Measure-Resend Authenticated Semi-Quantum Key Distribution Protocol against Reflecting Attack," Mathematics, MDPI, vol. 10(8), pages 1-19, April.
    5. Wenhao Yin & Yuhan Zhou & Duan Huang, 2023. "Denial-of-Service Attack Defense Strategy for Continuous Variable Quantum Key Distribution via Deep Learning," Mathematics, MDPI, vol. 11(12), pages 1-17, June.
    6. Florian Fesquet & Fabian Kronowetter & Michael Renger & Wun Kwan Yam & Simon Gandorfer & Kunihiro Inomata & Yasunobu Nakamura & Achim Marx & Rudolf Gross & Kirill G. Fedorov, 2024. "Demonstration of microwave single-shot quantum key distribution," Nature Communications, Nature, vol. 15(1), pages 1-8, December.
    7. Chen, Zhou & Chen, Zhaofeng & Yang, Zhaogang & Hu, Jiaming & Yang, Yong & Chang, Lingqian & Lee, L. James & Xu, Tengzhou, 2015. "Preparation and characterization of vacuum insulation panels with super-stratified glass fiber core material," Energy, Elsevier, vol. 93(P1), pages 945-954.
    8. Chen, Lingli & Li, Qin & Liu, Chengdong & Peng, Yu & Yu, Fang, 2021. "Efficient mediated semi-quantum key distribution," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 582(C).

    More about this item

    Keywords

    Quantum Key Distribution; CV-QKD; Implementation attack;
    All these keywords.

    JEL classification:

    • L86 - Industrial Organization - - Industry Studies: Services - - - Information and Internet Services; Computer Software
    • L96 - Industrial Organization - - Industry Studies: Transportation and Utilities - - - Telecommunications
    • O36 - Economic Development, Innovation, Technological Change, and Growth - - Innovation; Research and Development; Technological Change; Intellectual Property Rights - - - Open Innovation

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ime:imedps:25-e-03. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Kinken (email available below). General contact details of provider: https://edirc.repec.org/data/imegvjp.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.