5
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Burning the Trojan Horse: Defending against Side-Channel Attacks in QKD

      Preprint
      ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The discrete-variable QKD protocols based on BB84 are known to be secure against an eavesdropper, Eve, intercepting the flying qubits and performing any quantum operation on them. However, these protocols may still be vulnerable to side-channel attacks. We investigate the Trojan-Horse side-channel attack where Eve sends her own state into Alice's apparatus and measures the reflected state to estimate the key. We prove that the separable coherent state is optimal for Eve amongst the class of multi-mode Gaussian attack states. We describe how Alice may defend against this by adding thermal noise to the system and give an analytic expression of the resulting secret key rate. We also provide a bound on the secret key rate in the case where Eve may use any separable state, and describe an active defense system based on optical modulators.

          Related collections

          Most cited references6

          • Record: found
          • Abstract: found
          • Article: found
          Is Open Access

          Long-distance quantum communication with atomic ensembles and linear optics

          , , (2001)
          Quantum communication holds a promise for absolutely secure transmission of secret messages and faithful transfer of unknown quantum states. Photonic channels appear to be very attractive for physical implementation of quantum communication. However, due to losses and decoherence in the channel, the communication fidelity decreases exponentially with the channel length. We describe a scheme that allows to implement robust quantum communication over long lossy channels. The scheme involves laser manipulation of atomic ensembles, beam splitters, and single-photon detectors with moderate efficiencies, and therefore well fits the status of the current experimental technology. We show that the communication efficiency scale polynomially with the channel length thereby facilitating scalability to very long distances.
            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            Universally Composable Privacy Amplification Against Quantum Adversaries

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Simple security proof of quantum key distribution based on complementarity

              M. Koashi (2009)
                Bookmark

                Author and article information

                Journal
                19 January 2018
                Article
                1801.06496
                b6a4c06a-a3ad-4097-bbdb-7838dc0b23fc

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                13 pages, 5 figures
                quant-ph

                Comments

                Comment on this article