Dice Question Streamline Icon: https://streamlinehq.com

Fundamental feasibility of preventing information leakage in QKD devices

Determine whether it is fundamentally possible to guarantee, in practical implementations of Quantum Key Distribution (QKD), that devices such as single-photon detectors, quantum random number generators (QRNGs), and classical computing hardware leak only the information specified by the protocol—for example, preventing any external leakage of raw key material—and, if so, identify the design and shielding conditions required to achieve this non-leakage.

Information Square Streamline Icon: https://streamlinehq.com

Background

Within the assumptions underlying QKD, the paper highlights a critical implementation-level requirement: devices must not leak relevant or secret information beyond what the protocol specifies. This includes components such as single-photon detectors, QRNGs, and classical computers that process raw key material. The authors note that typical mitigation involves hardware shielding, but question whether such non-leakage can be guaranteed in principle.

This issue directly impacts QKD’s claimed security, since physical side-channel leakage could undermine confidentiality and authenticity even when protocol-level proofs hold. The authors explicitly state that the fundamental possibility of achieving non-leakage is unresolved, positioning it as a key open question that bridges practical engineering constraints and the theoretical security guarantees of QKD.

References

Devices do not leak any relevant/useful/secret information: It is assumed that devices like single photon detectors, the QRNGs, and the classical computer only leak information as specified in the protocol. For instance, the raw key stored on the classical computer must not be leaked externally. To ensure this, the hardware is typically required to be properly shielded. Whether this is fundamentally possible, remains an open question.

A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography (2502.04009 - Aquina et al., 6 Feb 2025) in Background, Subsection “Assumptions about QKD”, Item 4 (Devices do not leak any relevant/useful/secret information)