Pervasive Vulnerability Analysis and Defense for QKD-based Quantum Private Query
- URL: http://arxiv.org/abs/2601.01918v1
- Date: Mon, 05 Jan 2026 09:05:49 GMT
- Title: Pervasive Vulnerability Analysis and Defense for QKD-based Quantum Private Query
- Authors: Xiaoyu Peng, Bin Liu, Shiyu He, Nankun Mu, Wei Huang, Bingjie Xu, Fei Gao,
- Abstract summary: This study focuses on hidden information extraction under undetermined signal bits, revealing that most such QPQ protocols face severe security threats even without complex quantum resources.<n>To address these critical flaws, the proposed multi-encryption defense scheme is compatible with existing QPQ protocols.
- Score: 7.908856604745481
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Quantum Private Query (QPQ) based on Quantum Key Distribution (QKD) is among the most practically viable quantum communication protocols, with application value second only to QKD itself. However, prevalent security vulnerabilities in the post-processing stages of most existing QKD-based QPQ protocols have been severely overlooked. This study focuses on hidden information extraction under undetermined signal bits, revealing that most such QPQ protocols face severe security threats even without complex quantum resources. Specifically, direct observation attack causes incremental information leakage, while the minimum error discrimination attack efficiently steals additional database inforamtion. To address these critical flaws, the proposed multi-encryption defense scheme is compatible with existing QPQ protocols. The study demonstrates the necessity of the multi-encryption strategy for the security of databases in QPQ, providing key theoretical and technical support for constructing practical QPQ protocols resistant to real-world attacks.
Related papers
- Strengthening security and noise resistance in one-way quantum key distribution protocols through hypercube-based quantum walks [18.58925264895002]
Quantum Key Distribution (QKD) is a cryptographic protocol that ensures information-theoretic security.<n>Recent research has explored the use of discrete-time Quantum Walks (QWs) to enhance QKD schemes.
arXiv Detail & Related papers (2026-02-26T17:35:53Z) - Quantum Key Distribution with Imperfections: Recent Advances in Security Proofs [0.0]
Quantum Key Distribution (QKD) can enable two spatially separated parties to establish an information-theoretically secure encryption.<n>Security proofs robust against a wide range of eavesdropping strategies have established the theoretical soundness of several QKD protocols.<n>Most proofs are based on idealized models of the physical systems involved in such protocols and often include assumptions that are not satisfied in practical implementations.
arXiv Detail & Related papers (2026-02-04T21:16:33Z) - Noise-Resistant Feature-Aware Attack Detection Using Quantum Machine Learning [43.509065918669314]
Continuous-variable quantum key distribution (CV-QKD) is a quantum communication technology that offers an unconditional security guarantee.<n>We propose a quantum machine learning (QML)-based attack detection framework (QML-ADF) that safeguards the security of high-rate CV-QKD systems.
arXiv Detail & Related papers (2026-01-11T03:40:45Z) - Quantum key distribution without authentication and information leakage [14.19611301695484]
Quantum key distribution (QKD) is the most widely studied quantum cryptographic model.<n>We propose a new QKD variant that removes the need for a separate authentication mechanism.<n>Our design achieves (almost) perfect information-theoretic security with the protocol keys reusable.
arXiv Detail & Related papers (2026-01-06T09:25:45Z) - An introductory review of the theory of continuous-variable quantum key distribution: Fundamentals, protocols, and security [35.18016233072556]
Continuous-variable quantum key distribution (CV-QKD) has emerged as a promising approach for secure quantum communication.<n>CV-QKD offers advantages such as high key generation rates, compatibility with standard telecommunication infrastructure, and potential for integration on photonic chips.<n>This review provides an accessible introduction to the theory of CV-QKD, aimed at researchers entering this rapidly developing field.
arXiv Detail & Related papers (2025-12-01T15:03:19Z) - Quantum Key Distribution: Bridging Theoretical Security Proofs, Practical Attacks, and Error Correction for Quantum-Augmented Networks [0.0]
Quantum Key Distribution (QKD) is revolutionizing cryptography by promising information-theoretic security through the immutable laws of quantum mechanics.<n>Yet, the challenge of transforming idealized security models into practical, resilient systems remains a pressing issue.<n>This review critically dissects and synthesizes the latest advancements in QKD protocols and their security vulnerabilities.
arXiv Detail & Related papers (2025-11-25T18:31:02Z) - Hybrid Quantum Security for IPsec [1.8637078358591843]
This paper presents the first systematic comparison of sequential versus parallel hybrid QKD-PQC key establishment strategies for IPsec.<n>We introduce two novel approaches for incorporating QKD into Internet Key Exchange version 2 (IKEv2) with support for both ETSI GS QKD 004 stateful and ETSI GS QKD 014 stateless API specifications.<n>Our key insight is that parallel hybrid approaches eliminate the multiplicative latency penalties inherent in sequential methods mandated by RFC 9370.
arXiv Detail & Related papers (2025-07-12T13:54:04Z) - Integration of quantum random number generators with post-quantum cryptography algorithms [33.72751145910978]
Post-Quantum Cryptography (PQC) has become a potential solution to prolong the life of existing Public Key Infrastructure (PKI) systems.<n>PQC protocols depend on high-quality randomness for key generation and encapsulation procedures.<n>We demonstrate a proof-of-concept enabling the incorporation of Quantum Random Number Generation (QRNG) devices within communication networks using PQC-based Transport Layer Security (TLS)
arXiv Detail & Related papers (2025-07-01T10:56:39Z) - Quantum Secure Key Exchange with Position-based Credentials [0.0]
Quantum key distribution (QKD) provides an information-theoretic way of securely exchanging secret keys.<n>To lift the requirement of pre-shared or public keys, Buhrman et. al. proposed utilizing the location of a party as a credential.<n>We develop a QKD protocol with location credentials using quantum position verification (QPV) based message and identity authentication.
arXiv Detail & Related papers (2025-06-04T04:08:44Z) - Device-Independent Quantum Key Distribution: Protocols, Quantum Games, and Security [0.0]
Quantum Key Distribution (QKD) is based on the laws of quantum mechanics to enable provably secure communication.<n>Despite its theoretical security promise, practical QKD systems are vulnerable to serious attacks, including side-channel attacks and detector loopholes.<n> Device-Independent Quantum Key Distribution (DIQKD) overcomes these limitations by relying solely on observed nonlocal correlations.
arXiv Detail & Related papers (2025-05-20T11:52:21Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.<n>We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - QKD Based on Time-Entangled Photons and its Key-Rate Promise [24.07745562101555]
Time-entanglement-based QKD promises to increase the secret key rate and distribution compared to other QKD implementations.
We overview state-of-the-art from the information and coding theory perspective.
arXiv Detail & Related papers (2023-03-03T14:40:40Z) - Authentication of quantum key distribution with post-quantum
cryptography and replay attacks [1.8476815769956565]
Quantum key distribution (QKD) and post-quantum cryptography (PQC) are two cryptographic mechanisms with quantum-resistant security.
We propose two protocols based on PQC to realize the full authentication of QKD data post-processing.
arXiv Detail & Related papers (2022-06-02T17:29:34Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.