Extended analysis of the Trojan-horse attack in quantum key distribution

被引:14
|
作者
Vinay, Scott E. [1 ]
Kok, Pieter [1 ]
机构
[1] Univ Sheffield, Dept Phys & Astron, Sheffield S3 7RH, S Yorkshire, England
基金
英国工程与自然科学研究理事会;
关键词
SECURITY;
D O I
10.1103/PhysRevA.97.042335
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The discrete-variable quantum key distribution protocols based on the 1984 protocol of Bennett and Brassard (BB84) are known to be secure against an eavesdropper, Eve, intercepting the flying qubits and performing any quantum operation on them. However, these protocols may still be vulnerable to side-channel attacks. We investigate the Trojan-horse side-channel attack where Eve sends her own state into Alice's apparatus and measures the reflected state to estimate the key. We prove that the separable coherent state is optimal for Eve among the class of multimode Gaussian attack states, even in the presence of thermal noise. We then provide a bound on the secret key rate in the case where Eve may use any separable state.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Practical Security Bounds Against the Trojan-Horse Attack in Quantum Key Distribution
    Lucamarini, M.
    Choi, I.
    Ward, M. B.
    Dynes, J. F.
    Yuan, Z. L.
    Shields, A. J.
    PHYSICAL REVIEW X, 2015, 5 (03):
  • [2] Chip-Based Quantum Key Distribution against Trojan-Horse Attack
    Tan, Han
    Li, Wei
    Zhang, Likang
    Wei, Kejin
    Xu, Feihu
    PHYSICAL REVIEW APPLIED, 2021, 15 (06)
  • [3] Trojan-horse attacks on quantum-key-distribution systems
    Gisin, N
    Fasel, S
    Kraus, B
    Zbinden, H
    Ribordy, G
    PHYSICAL REVIEW A, 2006, 73 (02):
  • [4] Trojan-horse attacks on quantum key distribution with classical Bob
    Yu-Guang Yang
    Si-Jia Sun
    Qian-Qian Zhao
    Quantum Information Processing, 2015, 14 : 681 - 686
  • [5] Trojan-horse attack on a real-world quantum key distribution system: Theoretical and experimental security analysis
    Sushchev, Ivan S.
    Bulavkin, Daniil S.
    Bugai, Kirill E.
    Sidelnikova, Anna S.
    Dvoretskiy, Dmitriy A.
    PHYSICAL REVIEW APPLIED, 2024, 22 (03):
  • [6] Trojan-horse attacks on quantum key distribution with classical Bob
    Yang, Yu-Guang
    Sun, Si-Jia
    Zhao, Qian-Qian
    QUANTUM INFORMATION PROCESSING, 2015, 14 (02) : 681 - 686
  • [7] Risk Analysis of Trojan-Horse Attacks on Practical Quantum Key Distribution Systems
    Jain, Nitin
    Stiller, Birgit
    Khan, Imran
    Makarov, Vadim
    Marquardt, Christoph
    Leuchs, Gerd
    IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, 2015, 21 (03) : 168 - 177
  • [8] Invisible Trojan-horse attack
    Shihan Sajeed
    Carter Minshull
    Nitin Jain
    Vadim Makarov
    Scientific Reports, 7
  • [9] Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution
    Zijian Li
    Bingbing Zheng
    Chengxian Zhang
    Zhenrong Zhang
    Hong-Bo Xie
    Kejin Wei
    Quantum Information Processing, 23
  • [10] Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution
    Li, Zijian
    Zheng, Bingbing
    Zhang, Chengxian
    Zhang, Zhenrong
    Xie, Hong-Bo
    Wei, Kejin
    QUANTUM INFORMATION PROCESSING, 2024, 23 (02)