File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Effect of source tampering in the security of quantum cryptography

TitleEffect of source tampering in the security of quantum cryptography
Authors
Issue Date2015
Citation
Physical Review A - Atomic, Molecular, and Optical Physics, 2015, v. 92, n. 2, article no. 022304 How to Cite?
Abstract© 2015 American Physical Society. The security of source has become an increasingly important issue in quantum cryptography. Based on the framework of measurement-device-independent quantum key distribution (MDI-QKD), the source becomes the only region exploitable by a potential eavesdropper (Eve). Phase randomization is a cornerstone assumption in most discrete-variable (DV) quantum communication protocols (e.g., QKD, quantum coin tossing, weak-coherent-state blind quantum computing, and so on), and the violation of such an assumption is thus fatal to the security of those protocols. In this paper, we show a simple quantum hacking strategy, with commercial and homemade pulsed lasers, by Eve that allows her to actively tamper with the source and violate such an assumption, without leaving a trace afterwards. Furthermore, our attack may also be valid for continuous-variable (CV) QKD, which is another main class of QKD protocol, since, excepting the phase random assumption, other parameters (e.g., intensity) could also be changed, which directly determine the security of CV-QKD.
Persistent Identifierhttp://hdl.handle.net/10722/285532
ISSN
2014 Impact Factor: 2.808
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorSun, Shi Hai-
dc.contributor.authorXu, Feihu-
dc.contributor.authorJiang, Mu Sheng-
dc.contributor.authorMa, Xiang Chun-
dc.contributor.authorLo, Hoi Kwong-
dc.contributor.authorLiang, Lin Mei-
dc.date.accessioned2020-08-18T04:55:59Z-
dc.date.available2020-08-18T04:55:59Z-
dc.date.issued2015-
dc.identifier.citationPhysical Review A - Atomic, Molecular, and Optical Physics, 2015, v. 92, n. 2, article no. 022304-
dc.identifier.issn1050-2947-
dc.identifier.urihttp://hdl.handle.net/10722/285532-
dc.description.abstract© 2015 American Physical Society. The security of source has become an increasingly important issue in quantum cryptography. Based on the framework of measurement-device-independent quantum key distribution (MDI-QKD), the source becomes the only region exploitable by a potential eavesdropper (Eve). Phase randomization is a cornerstone assumption in most discrete-variable (DV) quantum communication protocols (e.g., QKD, quantum coin tossing, weak-coherent-state blind quantum computing, and so on), and the violation of such an assumption is thus fatal to the security of those protocols. In this paper, we show a simple quantum hacking strategy, with commercial and homemade pulsed lasers, by Eve that allows her to actively tamper with the source and violate such an assumption, without leaving a trace afterwards. Furthermore, our attack may also be valid for continuous-variable (CV) QKD, which is another main class of QKD protocol, since, excepting the phase random assumption, other parameters (e.g., intensity) could also be changed, which directly determine the security of CV-QKD.-
dc.languageeng-
dc.relation.ispartofPhysical Review A - Atomic, Molecular, and Optical Physics-
dc.titleEffect of source tampering in the security of quantum cryptography-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1103/PhysRevA.92.022304-
dc.identifier.scopuseid_2-s2.0-84939451143-
dc.identifier.volume92-
dc.identifier.issue2-
dc.identifier.spagearticle no. 022304-
dc.identifier.epagearticle no. 022304-
dc.identifier.eissn1094-1622-
dc.identifier.isiWOS:000358920100003-
dc.identifier.issnl1050-2947-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats