2018
DOI: 10.1103/physreva.98.062319
|View full text |Cite|
|
Sign up to set email alerts
|

Hacking Alice's box in continuous-variable quantum key distribution

Abstract: Security analyses of quantum cryptographic protocols typically rely on certain conditions; one such condition is that the sender (Alice) and receiver (Bob) have isolated devices inaccessible to third parties. If an eavesdropper (Eve) has a side-channel into one of the devices, then the key rate may be sensibly reduced. In this paper, we consider an attack on a coherent-state protocol, where Eve not only taps the main communication channel but also hacks Alice's device. This is done by introducing a Trojan hors… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 56 publications
1
14
0
Order By: Relevance
“…More generally, we can assume that Eve is able to detect the leakage from setups [42][43][44]. Here we consider this potential problem for the receiver's setup, so that the fraction 1 − η eff of the photons missed by the detection is stored by Eve and becomes part of her attack.…”
Section: Trust Levelsmentioning
confidence: 99%
“…More generally, we can assume that Eve is able to detect the leakage from setups [42][43][44]. Here we consider this potential problem for the receiver's setup, so that the fraction 1 − η eff of the photons missed by the detection is stored by Eve and becomes part of her attack.…”
Section: Trust Levelsmentioning
confidence: 99%
“…The attenuation then reverts back to the initial state within minutes. It is however still possible for Eve to exploit this temporary decrease in attenuation, leaking parts of the secret key [11,[33][34][35][36]. This vulnerability window then exists only for a limited time after the high-power exposure.…”
Section: B Fixed Attenuatormentioning
confidence: 99%
“…However, if the optical attenuation component itself can be altered and its attenuation decreased, either permanently or temporarily, the assumption about the mean photon number may be broken. Eve can then compromise the security of the QKD system [33][34][35][36]. In particular, even a very small increase of the mean photon number requires a correction to the secret key rate in decoy-state BB84 and MDI QKD protocols, otherwise the key becomes insecure [36].…”
Section: Introductionmentioning
confidence: 99%
“…Besides, Pereira et al . consider an attack on a coherent-state protocol; Eve not only taps the main communication channel but also hacks AliceâĂŹs device 40 . Nevertheless, there are some defects in theoretical analysis and it is hard to achieve.…”
Section: Introductionmentioning
confidence: 99%