Risk Analysis of Countermeasures Against the Trojan-Horse Attacks on Quantum Key Distribution Systems in 1260–1650 nm Spectral Range

2020 ◽  
Vol 128 (11) ◽  
pp. 1892-1900
Author(s):  
A. V. Borisova ◽  
B. D. Garmaev ◽  
I. B. Bobrov ◽  
S. S. Negodyaev ◽  
I. V. Sinil’shchikov
2015 ◽  
Vol 21 (3) ◽  
pp. 168-177 ◽  
Author(s):  
Nitin Jain ◽  
Birgit Stiller ◽  
Imran Khan ◽  
Vadim Makarov ◽  
Christoph Marquardt ◽  
...  

Author(s):  
Birgit Stiller ◽  
Imran Khan ◽  
Nitin Jain ◽  
Paul Jouguet ◽  
Sebastien Kunz-Jacques ◽  
...  

2006 ◽  
Vol 73 (2) ◽  
Author(s):  
N. Gisin ◽  
S. Fasel ◽  
B. Kraus ◽  
H. Zbinden ◽  
G. Ribordy

Cryptography ◽  
2017 ◽  
Vol 1 (3) ◽  
pp. 18 ◽  
Author(s):  
Anton Pljonkin ◽  
Konstantin Rumyantsev ◽  
Pradeep Singh

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Chia-Wei Tsai ◽  
Chun-Wei Yang

AbstractThe mediated semi-quantum key distribution (MSQKD) protocol is an important research issue that lets two classical participants share secret keys securely between each other with the help of a third party (TP). However, in the existing MSQKD protocols, there are two improvable issues, namely (1) the classical participants must be equipped with expensive detectors to avoid Trojan horse attacks and (2) the trustworthiness level of TP must be honest. To the best of our knowledge, none of the existing MSQKD protocols can resolve both these issues. Therefore, this study takes Bell states as the quantum resource to propose a MSQKD protocol, in which the classical participants do not need a Trojan horse detector and the TP is dishonest. Furthermore, the proposed protocol is shown to be secure against well-known attacks and the classical participants only need two quantum capabilities. Therefore, in comparison to the existing MSQKD protocols, the proposed protocol is better practical.


2015 ◽  
Vol 15 (15&16) ◽  
pp. 1295-1306
Author(s):  
Zoe Amblard ◽  
Francois Arnault

The Ekert quantum key distribution protocol [1] uses pairs of entangled qubits and performs checks based on a Bell inequality to detect eavesdropping. The 3DEB protocol [2] uses instead pairs of entangled qutrits to achieve better noise resistance than the Ekert protocol. It performs checks based on a Bell inequality for qutrits named CHSH-3 and found in [3, 4]. In this paper, we present a new protocol, which also uses pairs of entangled qutrits, but gaining advantage of a Bell inequality which achieves better noise resistance than the one used in 3DEB. The latter inequality is called here hCHSH-3 and was discovered in [5]. For each party, the hCHSH-3 inequality involves four observables already used in CHSH-3 but also two products of observables which do not commute. We explain how the parties can measure the observables corresponding to these products and thus are able to check the violation of hCHSH-3. In the presence of noise, this violation guarantees the security against a local Trojan horse attack. We also designed a version of our protocol which is secure against individual attacks.


2014 ◽  
pp. 811-840
Author(s):  
K. E. Rumyantsev ◽  
D. M. Golubchikov

This chapter is an analysis of commercial quantum key distribution systems. Upon analysis, the generalized structure of QKDS with phase coding of a photon state is presented. The structure includes modules that immediately participate in the task of distribution and processing of quantum states. Phases of key sequence productions are studied. Expressions that allow the estimation of physical characteristics of optoelectronic components, as well as information processing algorithms impact to rate of key sequence production, are formed. Information security infrastructure can be utilized, for instance, to formulate requirements to maximize tolerable error level in quantum channel with a given rate of key sequence production.


2014 ◽  
Vol 51 (9) ◽  
pp. 090603
Author(s):  
王剑 Wang Jian ◽  
朱勇 Zhu Yong ◽  
周华 Zhou Hua ◽  
苏洋 Su Yang ◽  
朱波 Zhu Bo

Sign in / Sign up

Export Citation Format

Share Document