Detector blinding attacks on counterfactual quantum key distribution
- URL: http://arxiv.org/abs/2011.02693v1
- Date: Thu, 5 Nov 2020 07:41:39 GMT
- Title: Detector blinding attacks on counterfactual quantum key distribution
- Authors: Carlos Navas Merlo, Juan Carlos Garcia-Escartin
- Abstract summary: Counterfactual quantum key distribution protocols allow two sides to establish a common secret key.
Part of the quantum state used to establish each bit never leaves the transmitting side, which hinders some attacks.
We present two attacks that use this ability to compromise the security of counterfactual quantum key distribution.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Counterfactual quantum key distribution protocols allow two sides to
establish a common secret key using an insecure channel and authenticated
public communication. As opposed to many other quantum key distribution
protocols, part of the quantum state used to establish each bit never leaves
the transmitting side, which hinders some attacks. We show how to adapt
detector blinding attacks to this setting. In blinding attacks, gated avalanche
photodiode detectors are disabled or forced to activate using bright light
pulses. We present two attacks that use this ability to compromise the security
of counterfactual quantum key distribution. The first is a general attack but
technologically demanding (the attacker must be able to reduce the channel loss
by half). The second attack could be deployed with easily accessible technology
and works for implementations where single photon sources are approximated by
attenuated coherent states. The attack is a combination of a photon number
splitting attack and the first blinding attack which could be deployed with
easily accessible technology. The proposed attacks show counterfactual quantum
key distribution is vulnerable to detector blinding and that experimental
implementations should include explicit countermeasures against it.
Related papers
- Hacking coherent-one-way quantum key distribution with present-day technology [0.0]
Recent results have shown that the secret-key rate of coherent-one-way (COW) quantum key distribution (QKD) scales quadratically with the system's transmittance.
This was proven by using a so-called zero-error attack, which relies on an unambiguous state discrimination (USD) measurement.
Here, we investigate the feasibility and effectiveness of zero-error attacks against COW QKD with present-day technology.
arXiv Detail & Related papers (2024-06-19T18:16:29Z) - Demonstration of quantum-digital payments [36.136619420474766]
We show how quantum light can secure daily digital payments by generating inherently unforgeable quantum cryptograms.
Unlike previously proposed protocols, our solution does not depend on long-term quantum storage or trusted agents and authenticated channels.
It is practical with near-term technology and may herald an era of quantum-enabled security.
arXiv Detail & Related papers (2023-05-23T20:20:14Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Suppressing Amplitude Damping in Trapped Ions: Discrete Weak
Measurements for a Non-unitary Probabilistic Noise Filter [62.997667081978825]
We introduce a low-overhead protocol to reverse this degradation.
We present two trapped-ion schemes for the implementation of a non-unitary probabilistic filter against amplitude damping noise.
This filter can be understood as a protocol for single-copy quasi-distillation.
arXiv Detail & Related papers (2022-09-06T18:18:41Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Experimental quantum key distribution certified by Bell's theorem [0.0]
cryptographic key exchange protocols traditionally rely on computational conjectures to provide security against eavesdropping attacks.
quantum key distribution protocols provide information-theoretic security against such attacks.
However, quantum protocols are subject to a new class of attacks exploiting implementation defects in the physical devices involved.
We present here the experimental realisation of a complete quantum key distribution protocol immune to these vulnerabilities.
arXiv Detail & Related papers (2021-09-29T17:52:48Z) - A generalized efficiency mismatch attack to bypass detection-scrambling
countermeasure [0.0]
We show that the proposed countermeasure can be bypassed if the attack is generalized by including more attack variables.
Our result and methodology could be used to security-certify a free-space quantum communication receiver against all types of detector-efficiency-mismatch type attacks.
arXiv Detail & Related papers (2021-01-07T05:02:24Z) - Noiseless attack and counterfactual security of quantum key distribution [0.0]
We show that the efficiency of counterfactual QKD protocols can be enhanced by including non-counterfactual bits.
We show how this problem can be resolved in a simple way, whereby the non-counterfactual key bits are indicated to be secure.
This method of enhancing the key rate is shown to be applicable to various existing quantum counterfactual key distribution protocols.
arXiv Detail & Related papers (2020-12-09T16:48:43Z) - From Practice to Theory: The "Bright Illumination" Attack on Quantum Key
Distribution Systems [0.0]
The "Bright Illumination" attack is a practical attack, fully implementable against quantum key distribution systems.
Here we explain how the "Reversed-Space" methodology of attacks, complementary to the notion of "quantum side-channel attacks," has missed the opportunity of predicting the "Bright Illumination" attack.
arXiv Detail & Related papers (2020-11-04T06:50:26Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.