首页> 外文OA文献 >Trustworthiness of detectors in quantum key distribution with untrusted detectors
【2h】

Trustworthiness of detectors in quantum key distribution with untrusted detectors

机译:不可信赖量子密钥分配中探测器的可信度   探测器

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Measurement-device-independent quantum key distribution (MDI-QKD) protocolhas been demonstrated as a viable solution to detector side-channel attacks.One of the main advantages of MDI-QKD is that the security can be provedwithout making any assumptions about how the measurement device works. Theprice to pay is the relatively low secure key rate comparing with conventionalquantum key distribution (QKD), such as the decoy-state BB84 protocol. Recentlya new QKD protocol, aiming at bridging the strong security of MDI-QKD with thehigh efficiency of conventional QKD, has been proposed. In this protocol, thelegitimate receiver employs a trusted linear optics network to encodeinformation on photons received from an insecure quantum channel, and thenperforms a Bell state measurement (BSM) using untrusted detectors. One crucialassumption made in most of these studies is that the untrusted BSM locatedinside the receiver's laboratory cannot send any unwanted information to theoutside. Here, we show that if the BSM is completely untrusted, a simple schemewould allow the BSM to send information to the outside. Combined with Trojanhorse attacks, this scheme could allow Eve to gain information of the quantumkey without being detected. To prevent the above attack, either countermeasuresto Trojan horse attacks or some trustworthiness to the "untrusted" BSM deviceis required.
机译:已经证明了与测量设备无关的量子密钥分发(MDI-QKD)协议是检测器侧信道攻击的可行解决方案。MDI-QKD的主要优点之一是无需对测量方法进行任何假设即可证明其安全性。设备有效。与传统的量子密钥分发(QKD)(例如诱骗状态BB84协议)相比,支付的价格是相对较低的安全密钥率。近来,已经提出了一种新的QKD协议,其旨在将MDI-QKD的强安全性与常规QKD的高效性桥接在一起。在此协议中,合法的接收器采用可信的线性光学网络对从不安全的量子通道接收的光子上的信息进行编码,然后使用不可信的检测器执行贝尔状态测量(BSM)。这些研究中的大多数做出的一项关键假设是,位于接收方实验室内部的不受信任的BSM无法将任何不需要的信息发送到外部。在这里,我们表明,如果BSM完全不受信任,则可以通过一种简单的方案使BSM将信息发送到外部。结合特洛伊木马攻击,此方案可以允许夏娃获得量子密钥的信息而不会被检测到。为防止上述攻击,需要采取针对木马攻击的对策或对“不受信任的” BSM设备具有一定的信任度。

著录项

  • 作者

    Qi, Bing;

  • 作者单位
  • 年度 2015
  • 总页数
  • 原文格式 PDF
  • 正文语种
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号