File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1117/12.2502066
- Scopus: eid_2-s2.0-85057325008
- WOS: WOS:000452820800001
- Find via
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Quantum cryptography with malicious devices
Title | Quantum cryptography with malicious devices |
---|---|
Authors | |
Keywords | Covert channels Quantum cryptography Quantum key distribution Side-channel attacks Untrusted classical post-processing units Memory attacks Quantum communication |
Issue Date | 2018 |
Citation | Proceedings of SPIE - The International Society for Optical Engineering, 2018, v. 10803 How to Cite? |
Abstract | © 2018 SPIE. The current paradigm for the security of quantum key distribution (QKD) relies on the legitimate users of the system trusting their devices, which include both the quantum communication components and the classical post-processing units. However, in view of the memory attacks recently proposed against device-independent QKD, as well as the many hardware and software Trojan Horse attacks that threaten the security of conventional cryptography today, such trust is a very strong and unjustified assumption. Here we review a recent proposal to solve this problem based on the use of verifiable secret sharing and redundancies. We show that this approach can deliver secret key rates which are comparable to those obtained in an ideal scenario with honest devices. |
Persistent Identifier | http://hdl.handle.net/10722/285821 |
ISSN | 2023 SCImago Journal Rankings: 0.152 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Curty, Marcos | - |
dc.contributor.author | Lo, Hoi Kwong | - |
dc.date.accessioned | 2020-08-18T04:56:44Z | - |
dc.date.available | 2020-08-18T04:56:44Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | Proceedings of SPIE - The International Society for Optical Engineering, 2018, v. 10803 | - |
dc.identifier.issn | 0277-786X | - |
dc.identifier.uri | http://hdl.handle.net/10722/285821 | - |
dc.description.abstract | © 2018 SPIE. The current paradigm for the security of quantum key distribution (QKD) relies on the legitimate users of the system trusting their devices, which include both the quantum communication components and the classical post-processing units. However, in view of the memory attacks recently proposed against device-independent QKD, as well as the many hardware and software Trojan Horse attacks that threaten the security of conventional cryptography today, such trust is a very strong and unjustified assumption. Here we review a recent proposal to solve this problem based on the use of verifiable secret sharing and redundancies. We show that this approach can deliver secret key rates which are comparable to those obtained in an ideal scenario with honest devices. | - |
dc.language | eng | - |
dc.relation.ispartof | Proceedings of SPIE - The International Society for Optical Engineering | - |
dc.subject | Covert channels | - |
dc.subject | Quantum cryptography | - |
dc.subject | Quantum key distribution | - |
dc.subject | Side-channel attacks | - |
dc.subject | Untrusted classical post-processing units | - |
dc.subject | Memory attacks | - |
dc.subject | Quantum communication | - |
dc.title | Quantum cryptography with malicious devices | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1117/12.2502066 | - |
dc.identifier.scopus | eid_2-s2.0-85057325008 | - |
dc.identifier.volume | 10803 | - |
dc.identifier.spage | null | - |
dc.identifier.epage | null | - |
dc.identifier.eissn | 1996-756X | - |
dc.identifier.isi | WOS:000452820800001 | - |
dc.identifier.issnl | 0277-786X | - |