2023
DOI: 10.3390/e25030499
|View full text |Cite
|
Sign up to set email alerts
|

Dictionary Learning Based Scheme for Adversarial Defense in Continuous-Variable Quantum Key Distribution

Abstract: There exist various attack strategies in continuous-variable quantum key distribution (CVQKD) system in practice. Due to the powerful information processing ability of neural networks, they are applied to the detection and classification of attack strategies in CVQKD systems. However, neural networks are vulnerable to adversarial attacks, resulting in the CVQKD system using neural networks also having security risks. To solve this problem, we propose a defense scheme for the CVQKD system. We first perform low-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 44 publications
0
7
0
Order By: Relevance
“…While ML has shown potential to enhance several aspects of CV-QKD, its application needs to be carefully scrutinized with respect to the introduction of security vulnerabilities (e.g., [41,42]), where existing proofs may no longer hold. Finally, ML also has potential for QKD protocol selection (as was investigated in [65] for discrete-variable QKD) and could additionally be expanded to protocol optimization and design.…”
Section: Suggested Future Workmentioning
confidence: 99%
See 2 more Smart Citations
“…While ML has shown potential to enhance several aspects of CV-QKD, its application needs to be carefully scrutinized with respect to the introduction of security vulnerabilities (e.g., [41,42]), where existing proofs may no longer hold. Finally, ML also has potential for QKD protocol selection (as was investigated in [65] for discrete-variable QKD) and could additionally be expanded to protocol optimization and design.…”
Section: Suggested Future Workmentioning
confidence: 99%
“…Research on ML-assisted quantum attacks [32,33], attack detection and prevention [27,[34][35][36][37][38][39][40], and methods for hacking ML-based attack prevention strategies [41,42] is not included in this survey. Huang, Liu, and Zhang [43] have previously reviewed the literature in this area.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Not included in this survey, is research on ML-assisted quantum attacks [30,31], attack detection and prevention [25,[32][33][34][35][36][37][38], and methods for hacking ML-based attack prevention strategies [39,40]. Huang, Liu, and Zhang [41] have previously reviewed the literature in this area.…”
Section: Of 21mentioning
confidence: 99%
“…In this paper, to improve the practical security of LLO CVQKD, we propose a general defense strategy via deep learning that can be monitored in real-time without adding additional optics considering the development of machine learning opens a door for QKD. [27][28][29][30][31][32][33][34][35] We investigate the typical characteristics of pulses affected by attacks and the deviations in the changes in these characteristics after being subjected to different attacks. After analysis, several features are selected to construct feature vectors for training generative adversarial networks (GANs).…”
Section: Introductionmentioning
confidence: 99%