22.60.+e Eavesdropping detection

Random Variation of Detector Efficiency: A Countermeasure against Detector Blinding Attacks for Quantum Key Distribution

Date: 
2015-05-27
Author(s): 

Charles Ci Wen Lim, Nino Walenta, Matthieu Legre, Nicolas Gisin, Hugo Zbinden

Reference: 

IEEE Journal of Selected Topics in Quantum Electronics, vol.21, no.3, pp.1,5, May-June 2015

In the recent decade, it has been discovered that QKD systems are extremely vulnerable to side-channel attacks.In particular, by exploiting the internal working knowledge of practical detectors, it is possible to bring them to an operating region whereby only certain target detectors are sensitive to detections. Crucially, the adversary can use this loophole to learn everything about the secret key without introducing any error to the quantum channel.

Random Variation of Detector Efficiency: A Secure Countermeasure against Detector Blinding Attacks for Quantum Key Distribution

Date: 
2014-08-27 - 2014-11-05
Author(s): 

Charles Ci Wen Lim, Nino Walenta, Matthieu Legre, Nicolas Gisin, Hugo Zbinden

Reference: 

arXiv:1408.6398

In the recent decade, it has been discovered that QKD systems are extremely vulnerable to side-channel attacks. In particular, by exploiting the internal working knowledge of practical detectors, it is possible to bring them to an operating region whereby only certain target detectors are sensitive to detections. Crucially, the adversary can use this loophole to learn everything about the secret key without introducing any error to the quantum channel.

Position-Based Quantum Cryptography: Impossibility and Constructions

Date: 
2011-01-10
Author(s): 

H. Buhrman, N. Chandran, S. Fehr, R. Gelles, V. Goyal, R. Ostrovsky, C. Schaffner

Reference: 

Proceedings of the Workshop on Quantum Information Processing (QIP, 2011)

In this work, the authors study position-based cryptography in the quantum setting. On the negative side, they show that if adversaries are allowed to share an arbitrarily large entangled quantum state, no secure position-verification is possible at all. On the positive side, they show that if adversaries do not share any entangled quantum state but can compute arbitrary quantum operations, secure position-verification is achievable. In models where secure positioning is achievable, it has a number of interesting applications.

Syndicate content