File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Foiling covert channels and malicious classical post-processing units in quantum key distribution

TitleFoiling covert channels and malicious classical post-processing units in quantum key distribution
Authors
Issue Date2019
Citation
npj Quantum Information, 2019, v. 5, n. 1, article no. 14 How to Cite?
Abstract© 2019, The Author(s). The existing paradigm for the security of quantum key distribution (QKD) suffers from two fundamental weaknesses. First, covert channels have emerged as an important threat and have attracted a lot of attention in security research in conventional information and communication systems. Covert channels (e.g. memory attacks) can fatally break the security of even device-independent quantum key distribution (DI-QKD), whenever QKD devices are re-used. Second, it is often implicitly assumed that the classical post-processing units of a QKD system are trusted. This is a rather strong assumption and is very hard to justify in practice. Here, we propose a new paradigm for the security of QKD that addresses these two fundamental problems. Specifically, we show that by using verifiable secret sharing and multiple optical devices and classical post-processing units, one could re-establish the security of QKD. Our techniques are rather general and they apply to both DI-QKD and non-DI-QKD.
Persistent Identifierhttp://hdl.handle.net/10722/285841
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorCurty, Marcos-
dc.contributor.authorLo, Hoi Kwong-
dc.date.accessioned2020-08-18T04:56:47Z-
dc.date.available2020-08-18T04:56:47Z-
dc.date.issued2019-
dc.identifier.citationnpj Quantum Information, 2019, v. 5, n. 1, article no. 14-
dc.identifier.urihttp://hdl.handle.net/10722/285841-
dc.description.abstract© 2019, The Author(s). The existing paradigm for the security of quantum key distribution (QKD) suffers from two fundamental weaknesses. First, covert channels have emerged as an important threat and have attracted a lot of attention in security research in conventional information and communication systems. Covert channels (e.g. memory attacks) can fatally break the security of even device-independent quantum key distribution (DI-QKD), whenever QKD devices are re-used. Second, it is often implicitly assumed that the classical post-processing units of a QKD system are trusted. This is a rather strong assumption and is very hard to justify in practice. Here, we propose a new paradigm for the security of QKD that addresses these two fundamental problems. Specifically, we show that by using verifiable secret sharing and multiple optical devices and classical post-processing units, one could re-establish the security of QKD. Our techniques are rather general and they apply to both DI-QKD and non-DI-QKD.-
dc.languageeng-
dc.relation.ispartofnpj Quantum Information-
dc.rightsThis work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.-
dc.titleFoiling covert channels and malicious classical post-processing units in quantum key distribution-
dc.typeArticle-
dc.description.naturepublished_or_final_version-
dc.identifier.doi10.1038/s41534-019-0131-5-
dc.identifier.scopuseid_2-s2.0-85070900143-
dc.identifier.volume5-
dc.identifier.issue1-
dc.identifier.spagearticle no. 14-
dc.identifier.epagearticle no. 14-
dc.identifier.eissn2056-6387-
dc.identifier.isiWOS:000458463300001-
dc.identifier.issnl2056-6387-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats