首页> 外文期刊>Quantum information & computation >Time-shift attack in practical quantum cryptosystems
【24h】

Time-shift attack in practical quantum cryptosystems

机译:实用量子密码系统中的时移攻击

获取原文
获取原文并翻译 | 示例
           

摘要

Recently, a new type of attack, which exploits the efficiency mismatch of two single photon detectors (SPD) in a quantum key distribution (QKD) system, has been proposed. In this paper, we propose another "time-shift" attack that exploits the same imperfection. In our attack, Eve shifts the arrival time of either the signal pulse or the synchronization pulse or both between Alice and Bob. In particular, in a QKD system where Bob employs time-multiplexing technique to detect both bit "0" and bit "1" with the same SPD, Eve, in some circumstances, could acquire full information on the final key without introducing any error. In addition, we prove that if Alice and Bob are unaware of our attack, the final key they share is insecure. We emphasize that our attack is simple and feasible with current technology. Finally, we discuss some counter measures against our and earlier attacks.
机译:近来,已经提出了一种新型的攻击,其利用了量子密钥分配(QKD)系统中两个单光子探测器(SPD)的效率失配。在本文中,我们提出了另一种利用相同缺陷的“时移”攻击。在我们的攻击中,夏娃在爱丽丝和鲍勃之间移动信号脉冲或同步脉冲或两者的到达时间。尤其是,在鲍勃(Bob)使用时分复用技术来检测具有相同SPD的位“ 0”和位“ 1”两者的QKD系统中,夏娃在某些情况下可以获取有关最终​​密钥的完整信息而不会引入任何错误。此外,我们证明,如果爱丽丝和鲍勃不知道我们的攻击,则他们共享的最终密钥是不安全的。我们强调,使用当前技术,我们的攻击既简单又可行。最后,我们讨论了针对我们的和早期攻击的一些对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号