Quantum key distribution with untrusted detectors
Side-channel attacks currently constitute the main challenge for quantum key distribution (QKD) to bridge theory with practice. So far two main approaches have been introduced to address this problem, (full) device-independent QKD and measurement-device-independent QKD. Here we present a third solut...
Autores principales: | , , , , , , , , |
---|---|
Formato: | JOUR |
Materias: | |
Acceso en línea: | http://hdl.handle.net/20.500.12110/paper_10502947_v92_n2_p_Gonzalez |
Aporte de: |
id |
todo:paper_10502947_v92_n2_p_Gonzalez |
---|---|
record_format |
dspace |
spelling |
todo:paper_10502947_v92_n2_p_Gonzalez2023-10-03T16:00:23Z Quantum key distribution with untrusted detectors González, P. Rebón, L. Ferreira da Silva, T. Figueroa, M. Saavedra, C. Curty, M. Lima, G. Xavier, G.B. Nogueira, W.A.T. Hardware security Side channel attack Bridge theories Eavesdropping strategies Legitimate users Low-loss Measurement device Quantum cryptography Side-channel attacks currently constitute the main challenge for quantum key distribution (QKD) to bridge theory with practice. So far two main approaches have been introduced to address this problem, (full) device-independent QKD and measurement-device-independent QKD. Here we present a third solution that might exceed the performance and practicality of the previous two in circumventing detector side-channel attacks, which arguably is the most hazardous part of QKD implementations. Our proposal has, however, one main requirement: the legitimate users of the system need to ensure that their labs do not leak any unwanted information to the outside. The security in the low-loss regime is guaranteed, while in the high-loss regime we already prove its robustness against some eavesdropping strategies. © 2015 American Physical Society. JOUR info:eu-repo/semantics/openAccess http://creativecommons.org/licenses/by/2.5/ar http://hdl.handle.net/20.500.12110/paper_10502947_v92_n2_p_Gonzalez |
institution |
Universidad de Buenos Aires |
institution_str |
I-28 |
repository_str |
R-134 |
collection |
Biblioteca Digital - Facultad de Ciencias Exactas y Naturales (UBA) |
topic |
Hardware security Side channel attack Bridge theories Eavesdropping strategies Legitimate users Low-loss Measurement device Quantum cryptography |
spellingShingle |
Hardware security Side channel attack Bridge theories Eavesdropping strategies Legitimate users Low-loss Measurement device Quantum cryptography González, P. Rebón, L. Ferreira da Silva, T. Figueroa, M. Saavedra, C. Curty, M. Lima, G. Xavier, G.B. Nogueira, W.A.T. Quantum key distribution with untrusted detectors |
topic_facet |
Hardware security Side channel attack Bridge theories Eavesdropping strategies Legitimate users Low-loss Measurement device Quantum cryptography |
description |
Side-channel attacks currently constitute the main challenge for quantum key distribution (QKD) to bridge theory with practice. So far two main approaches have been introduced to address this problem, (full) device-independent QKD and measurement-device-independent QKD. Here we present a third solution that might exceed the performance and practicality of the previous two in circumventing detector side-channel attacks, which arguably is the most hazardous part of QKD implementations. Our proposal has, however, one main requirement: the legitimate users of the system need to ensure that their labs do not leak any unwanted information to the outside. The security in the low-loss regime is guaranteed, while in the high-loss regime we already prove its robustness against some eavesdropping strategies. © 2015 American Physical Society. |
format |
JOUR |
author |
González, P. Rebón, L. Ferreira da Silva, T. Figueroa, M. Saavedra, C. Curty, M. Lima, G. Xavier, G.B. Nogueira, W.A.T. |
author_facet |
González, P. Rebón, L. Ferreira da Silva, T. Figueroa, M. Saavedra, C. Curty, M. Lima, G. Xavier, G.B. Nogueira, W.A.T. |
author_sort |
González, P. |
title |
Quantum key distribution with untrusted detectors |
title_short |
Quantum key distribution with untrusted detectors |
title_full |
Quantum key distribution with untrusted detectors |
title_fullStr |
Quantum key distribution with untrusted detectors |
title_full_unstemmed |
Quantum key distribution with untrusted detectors |
title_sort |
quantum key distribution with untrusted detectors |
url |
http://hdl.handle.net/20.500.12110/paper_10502947_v92_n2_p_Gonzalez |
work_keys_str_mv |
AT gonzalezp quantumkeydistributionwithuntrusteddetectors AT rebonl quantumkeydistributionwithuntrusteddetectors AT ferreiradasilvat quantumkeydistributionwithuntrusteddetectors AT figueroam quantumkeydistributionwithuntrusteddetectors AT saavedrac quantumkeydistributionwithuntrusteddetectors AT curtym quantumkeydistributionwithuntrusteddetectors AT limag quantumkeydistributionwithuntrusteddetectors AT xaviergb quantumkeydistributionwithuntrusteddetectors AT nogueirawat quantumkeydistributionwithuntrusteddetectors |
_version_ |
1807322297171705856 |