Information leakage via side channels in freespace BB84 quantum cryptography

被引:86
|
作者
Nauerth, Sebastian [1 ]
Fuerst, Martin [1 ]
Schmitt-Manderbach, Tobias [1 ,2 ]
Weier, Henning [1 ]
Weinfurter, Harald [1 ,2 ]
机构
[1] Univ Munich, Dept Phys, D-80799 Munich, Germany
[2] Max Planck Inst Quantum Opt, D-85748 Garching, Germany
来源
NEW JOURNAL OF PHYSICS | 2009年 / 11卷
关键词
KEY DISTRIBUTION;
D O I
10.1088/1367-2630/11/6/065001
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
While the BB84 protocol is in principle secure, real implementations suffer from imperfections. Here, we analyse a free space BB84 transmitter, operating with polarization encoded attenuated pulses. We report on measurements of all degrees of freedom of the transmitted photons in order to estimate potential side channels of the state preparation at Alice.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Security of Practical BB84 Quantum Key Distribution
    Algorithmica, 2002, 34 : 366 - 371
  • [22] Quantum key agreement protocol based on BB84
    Chong, Song-Kong
    Hwang, Tzonelih
    OPTICS COMMUNICATIONS, 2010, 283 (06) : 1192 - 1195
  • [23] Trojan Horse Attacks, Decoy State Method, and Side Channels of Information Leakage in Quantum Cryptography
    Molotkov, S. N.
    JOURNAL OF EXPERIMENTAL AND THEORETICAL PHYSICS, 2020, 130 (06) : 809 - 832
  • [24] Experimental Side Channel Analysis of BB84 QKD Source
    Biswas, Ayan
    Banerji, Anindya
    Chandravanshi, Pooja
    Kumar, Rupesh
    Singh, Ravindra P.
    IEEE JOURNAL OF QUANTUM ELECTRONICS, 2021, 57 (06)
  • [25] Trojan Horse Attacks, Decoy State Method, and Side Channels of Information Leakage in Quantum Cryptography
    S. N. Molotkov
    Journal of Experimental and Theoretical Physics, 2020, 130 : 809 - 832
  • [26] Quantum Bit Commitment Combining with BB84 Protocol
    Zhang, Linxi
    Zhu, Changhua
    Zhao, Nan
    Pei, Changxing
    ELECTRICAL AND CONTROL ENGINEERING & MATERIALS SCIENCE AND MANUFACTURING, 2016, : 291 - 298
  • [27] Explicit attack on the key in quantum cryptography (BB84 protocol) reaching the theoretical error limit Qc ≈ 11%
    Molotkov, S. N.
    Timofeev, A. V.
    JETP LETTERS, 2007, 85 (10) : 524 - 529
  • [28] Explicit attack on the key in quantum cryptography (BB84 protocol) reaching the theoretical error limit Qc ≈ 11%
    S. N. Molotkov
    A. V. Timofeev
    JETP Letters, 2007, 85 : 524 - 529
  • [29] Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications
    V A.D.
    V K.
    Personal and Ubiquitous Computing, 2023, 27 (03) : 875 - 885
  • [30] Eavesdropping Detection in BB84 Quantum Key Distribution Protocols
    Lee, Chankyun
    Sohn, Ilkwon
    Lee, Wonhyuk
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (03): : 2689 - 2701