Improved Finite-Key Security Analysis of Quantum Key Distribution
Against Trojan-Horse Attacks
- URL: http://arxiv.org/abs/2202.06630v1
- Date: Mon, 14 Feb 2022 11:35:26 GMT
- Title: Improved Finite-Key Security Analysis of Quantum Key Distribution
Against Trojan-Horse Attacks
- Authors: \'Alvaro Navarrete and Marcos Curty
- Abstract summary: Most security proofs of quantum key distribution (QKD) disregard the effect of information leakage from the users' devices.
In a Trojan-horse attack, the eavesdropper injects strong light into the QKD apparatuses, and then analyzes the back-reflected light to learn information about their internal setting choices.
We derive finite-key security bounds for decoy-state-based QKD schemes in the presence of THAs, which significantly outperform previous analyses.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Most security proofs of quantum key distribution (QKD) disregard the effect
of information leakage from the users' devices, and, thus, do not protect
against Trojan-horse attacks (THAs). In a THA, the eavesdropper injects strong
light into the QKD apparatuses, and then analyzes the back-reflected light to
learn information about their internal setting choices. Only a few recent works
consider this security threat, but predict a rather poor performance of QKD
unless the devices are strongly isolated from the channel. Here, we derive
finite-key security bounds for decoy-state-based QKD schemes in the presence of
THAs, which significantly outperform previous analyses. Our results constitute
an important step forward to closing the existing gap between theory and
practice in QKD.
Related papers
- Improved security bounds against the Trojan-Horse attack in decoy-state
quantum key distribution [9.817648279997027]
In a quantum Trojan-horse attack (THA), eavesdroppers learn encoded information by injecting bright light into encoded or decoded devices of quantum key distribution (QKD) systems.
Here, we present a numerical method for achieving improved security bound for a decoy-state QKD system under THAs.
arXiv Detail & Related papers (2023-12-24T04:07:34Z) - Finite-Key Analysis for Coherent One-Way Quantum Key Distribution [18.15943439545963]
Coherent-one-way (COW) quantum key distribution (QKD) is a significant communication protocol that has been implemented experimentally and deployed in practical products.
Existing security analyses of COW-QKD either provide a short transmission distance or lack immunity against coherent attacks in the finite-key regime.
We present a tight finite-key framework for a variant of COW-QKD, which has been proven to extend the secure transmission distance in the case.
arXiv Detail & Related papers (2023-09-28T03:32:06Z) - A Closer Look at the Adversarial Robustness of Deep Equilibrium Models [25.787638780625514]
We develop approaches to estimate the intermediate gradients of DEQs and integrate them into the attacking pipelines.
Our approaches facilitate fully white-box evaluations and lead to effective adversarial defense for DEQs.
arXiv Detail & Related papers (2023-06-02T10:40:30Z) - QKD Based on Time-Entangled Photons and its Key-Rate Promise [24.07745562101555]
Time-entanglement-based QKD promises to increase the secret key rate and distribution compared to other QKD implementations.
We overview state-of-the-art from the information and coding theory perspective.
arXiv Detail & Related papers (2023-03-03T14:40:40Z) - Security of device-independent quantum key distribution protocols: a
review [0.0]
Device-independent quantum key distribution (DI-QKD) is often seen as the ultimate key exchange protocol in terms of security.
We will provide an introduction to DI-QKD, an overview of the related experiments performed, and the theory and techniques required to analyse its security.
arXiv Detail & Related papers (2022-06-10T09:20:20Z) - Unbalanced-basis-misalignment tolerant measurement-device-independent
quantum key distribution [22.419105320267523]
Measurement-device-independent quantum key distribution (MDIQKD) is a revolutionary protocol since it is physically immune to all attacks on the detection side.
Some protocols release part of the assumptions in the encoding system to keep the practical security, but the performance would be dramatically reduced.
We present a MDIQKD protocol that requires less knowledge of encoding system to combat the troublesome modulation errors and fluctuations.
arXiv Detail & Related papers (2021-08-27T02:16:20Z) - Twin-field quantum key distribution with passive-decoy state [22.26373392802507]
We propose passive-decoy based TF-QKD, in which we combine TF-QKD with the passive-decoy method.
We present a simulation comparing the key generation rate with that in active-decoy, the result shows our scheme performs as good as active decoy TF-QKD.
arXiv Detail & Related papers (2020-11-15T04:02:48Z) - Finite-key analysis for twin-field quantum key distribution based on
generalized operator dominance condition [23.004519226886444]
Quantum key distribution (QKD) can help two distant peers to share secret key bits, whose security is guaranteed by the law of physics.
Recently, twin-field (TF) QKD has been proposed and intensively studied, since it can beat the rate-distance limit.
We propose an improved finite-key analysis of TF-QKD through new operator dominance condition.
arXiv Detail & Related papers (2020-07-17T09:41:06Z) - Secure quantum key distribution with a subset of malicious devices [0.0]
Malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security.
One possible approach to re-establish the security of QKD is to use a redundant number of devices.
We introduce an efficient distributed QKD post-processing protocol and prove its security in a variety of corruption models of the possibly malicious devices.
arXiv Detail & Related papers (2020-06-25T12:29:06Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z) - Quantum key distribution with correlated sources [1.7499351967216341]
In theory, quantum key distribution (QKD) offers information-theoretic security.
In practice, however, it does not due to discrepancies between the assumptions used in the security proofs and the behaviour of the real apparatuses.
Here, we close this gap by introducing a simple yet general method to prove the security of QKD with arbitrarily long-range pulse correlations.
arXiv Detail & Related papers (2019-08-22T09:05:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.