trojan horse attack
Recently Published Documents


TOTAL DOCUMENTS

19
(FIVE YEARS 6)

H-INDEX

7
(FIVE YEARS 2)

2021 ◽  
Vol 15 (6) ◽  
Author(s):  
Hao Tan ◽  
Wei Li ◽  
Likang Zhang ◽  
Kejin Wei ◽  
Feihu Xu

2020 ◽  
Vol 101 (2) ◽  
Author(s):  
Zheng-Hong Li ◽  
Luojia Wang ◽  
Jingping Xu ◽  
Yaping Yang ◽  
M. Al-Amri ◽  
...  

2019 ◽  
Vol 34 (34) ◽  
pp. 1950281 ◽  
Author(s):  
Chia-Wei Tsai ◽  
Chun-Wei Yang ◽  
Narn-Yih Lee

Classical users can share a secret key with a quantum user by using a semi-quantum key distribution (SQKD) protocol. Allowing two classical users to share a secret key is the objective of the mediated semi-quantum key distribution (MSQKD) protocol. However, the existing MSQKD protocols need a quantum user to assist two classical users in distributing the secret keys, and these protocols require that the classical users be equipped with a Trojan horse photon detector. This reduces the practicability of the MSQKD protocols. Therefore, in this study we propose a lightweight MSQKD, in which the two participants and third party are classical users. Due to the usage of the one-way transmission strategy, the proposed lightweight MSQKD protocol is free from quantum Trojan horse attack. The proposed MSQKD is more practical than the existing MSQKD protocols.


2019 ◽  
Vol 34 (24) ◽  
pp. 1950196 ◽  
Author(s):  
Tao Zheng ◽  
Shibin Zhang ◽  
Xiang Gao ◽  
Yan Chang

Quantum private query (QPQ) is a cryptographic application that protects the privacy of both users and databases while querying the database secretly. In most existing QPQ protocols, the protection of user privacy can only be cheat-sensitive. Cheat-sensitive means that Bob will be found later with a certain probability if he tries to get the address queried by Alice. On the premise of cheat-sensitivity, although Alice can discover Bob’s malicious behavior after a query (transaction), the secret information of Alice was leaked in the completed query, which is likely to be a fatal blow to Alice. Or, to prevent Bob’s malicious behavior, Alice executes one or more additional queries to test Bob’s honesty. However, to bypass Alice’s honesty test, Bob can also provide several honest queries before performing dishonest queries. Therefore, cheat-sensitive should not be the ultimate goal of user privacy protection in QPQ. In this paper, we propose a practical QKD-based QPQ protocol with better user privacy protection than cheat-sensitivity based on order rearrangement of qubits. The proposed QPQ protocol can resist the Trojan horse attack even without wavelength filter and photon number splitter (PNS) equipped with auxiliary monitoring detectors.


Quantum ◽  
2018 ◽  
Vol 2 ◽  
pp. 77 ◽  
Author(s):  
Adam Winick ◽  
Norbert Lütkenhaus ◽  
Patrick J. Coles

In this work, we present a reliable, efficient, and tight numerical method for calculating key rates for finite-dimensional quantum key distribution (QKD) protocols. We illustrate our approach by finding higher key rates than those previously reported in the literature for several interesting scenarios (e.g., the Trojan-horse attack and the phase-coherent BB84 protocol). Our method will ultimately improve our ability to automate key rate calculations and, hence, to develop a user-friendly software package that could be used widely by QKD researchers.


2017 ◽  
Vol 7 (1) ◽  
Author(s):  
Shihan Sajeed ◽  
Carter Minshull ◽  
Nitin Jain ◽  
Vadim Makarov

Sign in / Sign up

Export Citation Format

Share Document