Quantum hacking perceiving for quantum key distribution using temporal
ghost imaging
- URL: http://arxiv.org/abs/2012.14062v1
- Date: Mon, 28 Dec 2020 02:21:09 GMT
- Title: Quantum hacking perceiving for quantum key distribution using temporal
ghost imaging
- Authors: Fang-Xiang Wang, Juan Wu, Wei Chen, Shuang Wang, De-Yong He,
Zhen-Qiang Yin, Chang-Ling Zou, Guang-Can Guo, Zheng-Fu Han
- Abstract summary: Quantum key distribution (QKD) can generate secure key bits between remote users with quantum mechanics.
The most insidious attacks, known as quantum hacking, are the ones with no significant discrepancy of the measurement results.
We propose the method exploring temporal ghost imaging (TGI) scheme to perceive quantum hacking with temporal fingerprints.
- Score: 7.7270491671042425
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum key distribution (QKD) can generate secure key bits between remote
users with quantum mechanics. However, the gap between the theoretical model
and practical realizations gives eavesdroppers opportunities to intercept
secret key. The most insidious attacks, known as quantum hacking, are the ones
with no significant discrepancy of the measurement results using side-channel
loopholes of QKD systems. Depicting full-time-scale characteristics of the
quantum signals, the quantum channel, and the QKD system can provide legitimate
users extra capabilities to defeat malicious attacks. For the first time, we
propose the method exploring temporal ghost imaging (TGI) scheme to perceive
quantum hacking with temporal fingerprints and experimentally verify its
validity. The scheme presents a common approach to promote QKD's practical
security from a new perspective of signals and systems.
Related papers
- Breaking Quantum Key Distributions under Quantum Switch-Based Attack [0.0]
We introduce a new attack scenario where an eavesdropper, Eve, exploits a quantum switch using the indefinite causal order to intercept and manipulate quantum communication channel.
Our results highlight a previously overlooked vulnerability, emphasizing the need for countermeasures against quantum-controlled adversarial strategies.
arXiv Detail & Related papers (2025-02-10T18:56:47Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Increasing Interference Detection in Quantum Cryptography using the Quantum Fourier Transform [0.0]
We present two quantum cryptographic protocols leveraging the quantum Fourier transform (QFT)
The foremost of these protocols is a novel QKD method that leverages this effectiveness of the QFT.
We additionally show how existing quantum encryption methods can be augmented with a QFT-based approach to improve eavesdropping detection.
arXiv Detail & Related papers (2024-04-18T21:04:03Z) - QuantumSEA: In-Time Sparse Exploration for Noise Adaptive Quantum
Circuits [82.50620782471485]
QuantumSEA is an in-time sparse exploration for noise-adaptive quantum circuits.
It aims to achieve two key objectives: (1) implicit circuits capacity during training and (2) noise robustness.
Our method establishes state-of-the-art results with only half the number of quantum gates and 2x time saving of circuit executions.
arXiv Detail & Related papers (2024-01-10T22:33:00Z) - Deep-Learning-Based Radio-Frequency Side-Channel Attack on Quantum Key
Distribution [0.0]
Quantum key distribution (QKD) protocols are proven secure based on fundamental physical laws.
Side channels, where the encoded quantum state is correlated with properties of other degrees of freedom of the quantum channel, allow an eavesdropper to obtain information unnoticeably.
We here demonstrate a side-channel attack using a deep convolutional neural network to analyze the recorded classical, radio-frequency electromagnetic emissions.
arXiv Detail & Related papers (2023-10-20T18:00:02Z) - Quantum Imitation Learning [74.15588381240795]
We propose quantum imitation learning (QIL) with a hope to utilize quantum advantage to speed up IL.
We develop two QIL algorithms, quantum behavioural cloning (Q-BC) and quantum generative adversarial imitation learning (Q-GAIL)
Experiment results demonstrate that both Q-BC and Q-GAIL can achieve comparable performance compared to classical counterparts.
arXiv Detail & Related papers (2023-04-04T12:47:35Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Quantum Public Key Distribution using Randomized Glauber States [0.0]
State-of-the-art Quantum Key Distribution (QKD) is based on the uncertainty principle of qubits on quantum measurements.
We propose a novel quantum key distribution mechanism over a pure optical channel using randomized Glauber states.
arXiv Detail & Related papers (2023-02-15T14:12:52Z) - Quantum Key Distribution Using a Quantum Emitter in Hexagonal Boron
Nitride [48.97025221755422]
We demonstrate a room temperature, discrete-variable quantum key distribution system using a bright single photon source in hexagonal-boron nitride.
We have generated keys with one million bits length, and demonstrated a secret key of approximately 70,000 bits, at a quantum bit error rate of 6%.
Our work demonstrates the first proof of concept finite-key BB84 QKD system realised with hBN defects.
arXiv Detail & Related papers (2023-02-13T09:38:51Z) - The QQUIC Transport Protocol: Quantum assisted UDP Internet Connections [11.223026257748657]
Quantum key distribution, in 1984, is a commercialized secure communication method which enables two parties to produce shared random secret key by the nature of quantum mechanics.
We propose QQUIC (Quantum assisted Quick Internet Connections) transport protocol, which modifies the famous QUIC transport protocol by employing the quantum key distribution instead of the original classical algorithms in the key exchanging stage.
arXiv Detail & Related papers (2020-06-01T00:44:58Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.