File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1038/s41534-019-0131-5
- Scopus: eid_2-s2.0-85070900143
- WOS: WOS:000458463300001
Supplementary
- Citations:
- Appears in Collections:
Article: Foiling covert channels and malicious classical post-processing units in quantum key distribution
Title | Foiling covert channels and malicious classical post-processing units in quantum key distribution |
---|---|
Authors | |
Issue Date | 2019 |
Citation | npj Quantum Information, 2019, v. 5, n. 1, article no. 14 How to Cite? |
Abstract | © 2019, The Author(s). The existing paradigm for the security of quantum key distribution (QKD) suffers from two fundamental weaknesses. First, covert channels have emerged as an important threat and have attracted a lot of attention in security research in conventional information and communication systems. Covert channels (e.g. memory attacks) can fatally break the security of even device-independent quantum key distribution (DI-QKD), whenever QKD devices are re-used. Second, it is often implicitly assumed that the classical post-processing units of a QKD system are trusted. This is a rather strong assumption and is very hard to justify in practice. Here, we propose a new paradigm for the security of QKD that addresses these two fundamental problems. Specifically, we show that by using verifiable secret sharing and multiple optical devices and classical post-processing units, one could re-establish the security of QKD. Our techniques are rather general and they apply to both DI-QKD and non-DI-QKD. |
Persistent Identifier | http://hdl.handle.net/10722/285841 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Curty, Marcos | - |
dc.contributor.author | Lo, Hoi Kwong | - |
dc.date.accessioned | 2020-08-18T04:56:47Z | - |
dc.date.available | 2020-08-18T04:56:47Z | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | npj Quantum Information, 2019, v. 5, n. 1, article no. 14 | - |
dc.identifier.uri | http://hdl.handle.net/10722/285841 | - |
dc.description.abstract | © 2019, The Author(s). The existing paradigm for the security of quantum key distribution (QKD) suffers from two fundamental weaknesses. First, covert channels have emerged as an important threat and have attracted a lot of attention in security research in conventional information and communication systems. Covert channels (e.g. memory attacks) can fatally break the security of even device-independent quantum key distribution (DI-QKD), whenever QKD devices are re-used. Second, it is often implicitly assumed that the classical post-processing units of a QKD system are trusted. This is a rather strong assumption and is very hard to justify in practice. Here, we propose a new paradigm for the security of QKD that addresses these two fundamental problems. Specifically, we show that by using verifiable secret sharing and multiple optical devices and classical post-processing units, one could re-establish the security of QKD. Our techniques are rather general and they apply to both DI-QKD and non-DI-QKD. | - |
dc.language | eng | - |
dc.relation.ispartof | npj Quantum Information | - |
dc.rights | This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. | - |
dc.title | Foiling covert channels and malicious classical post-processing units in quantum key distribution | - |
dc.type | Article | - |
dc.description.nature | published_or_final_version | - |
dc.identifier.doi | 10.1038/s41534-019-0131-5 | - |
dc.identifier.scopus | eid_2-s2.0-85070900143 | - |
dc.identifier.volume | 5 | - |
dc.identifier.issue | 1 | - |
dc.identifier.spage | article no. 14 | - |
dc.identifier.epage | article no. 14 | - |
dc.identifier.eissn | 2056-6387 | - |
dc.identifier.isi | WOS:000458463300001 | - |
dc.identifier.issnl | 2056-6387 | - |