Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution
Autor: | Duan Huang, Yaxi Pan, Ling Zhang |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2020 |
Předmět: |
Computer science
Quantum key distribution 01 natural sciences lcsh:Technology 010305 fluids & plasmas law.invention lcsh:Chemistry law 0103 physical sciences General Materials Science 010306 general physics Instrumentation lcsh:QH301-705.5 Computer Science::Cryptography and Security Fluid Flow and Transfer Processes Noise (signal processing) lcsh:T CV-QKD Process Chemistry and Technology General Engineering Shot noise Trojan horse Quantum Physics lcsh:QC1-999 Computer Science Applications Transmission (telecommunications) lcsh:Biology (General) lcsh:QD1-999 lcsh:TA1-2040 Information leakage security bounds Key (cryptography) lcsh:Engineering (General). Civil engineering (General) Algorithm Beam splitter lcsh:Physics trojan horse attacks |
Zdroj: | Applied Sciences Volume 10 Issue 21 Applied Sciences, Vol 10, Iss 7788, p 7788 (2020) |
ISSN: | 2076-3417 |
DOI: | 10.3390/app10217788 |
Popis: | As the existence of non-zero reflection coefficients in the real component of continuous-variable quantum key distribution (CV-QKD) systems, Eve can probe the system by sending the bright light pulses into Alice&rsquo s set-up. With the analysis of back-reflections, Eve only takes a few back-reflected photons to intercept information and obtain the raw key bit. In this paper, the attack problems are converted into the information leakage problems. First, we analyzed the Trojan horse attacks with different wavelengths and confirmed its side effects, such as crosstalk and anti-Stokes Raman scattering, by a numerical simulation. Then, based on the wavelength-dependent property of beam splitter, we presented a practical way to estimate the deviation of shot noise and therefore correct the excess noise by inserting different wavelength pulses under joint attacks. Finally, we specified the security bounds of the system through quantifying the excess noise bounds caused by the Trojan horse attacks and provided a theoretical reference for the secret key transmission of system. As a consequence, the transmission errors within the security bounds can be negligible and the legitimate users will not perceive the presence of Eve. |
Databáze: | OpenAIRE |
Externí odkaz: |