2016
DOI: 10.1103/physrevlett.117.250505
|View full text |Cite
|
Sign up to set email alerts
|

Insecurity of Detector-Device-Independent Quantum Key Distribution

Abstract: Detector-device-independent quantum key distribution (DDI-QKD) held the promise of being robust to detector side channels, a major security loophole in quantum key distribution (QKD) implementations. In contrast to what has been claimed, however, we demonstrate that the security of DDI-QKD is not based on postselected entanglement, and we introduce various eavesdropping strategies that show that DDI-QKD is in fact insecure against detector side-channel attacks as well as against other attacks that exploit devi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
33
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 57 publications
(33 citation statements)
references
References 48 publications
(134 reference statements)
0
33
0
Order By: Relevance
“…Notes added in proof After a completion of a preliminary version of this paper, a recent preprint 181 has been posted on the arXiv that demonstrates the insecurity of DDI-QKD protocol. In addition, it has come to our attention that DI-QKD remains vulnerable to covert channels such as memory attack.…”
Section: Resultsmentioning
confidence: 99%
“…Notes added in proof After a completion of a preliminary version of this paper, a recent preprint 181 has been posted on the arXiv that demonstrates the insecurity of DDI-QKD protocol. In addition, it has come to our attention that DI-QKD remains vulnerable to covert channels such as memory attack.…”
Section: Resultsmentioning
confidence: 99%
“…The third and final assumptions are different from the scenario of MDI-QKD. They are necessary to prevent particular classes of side channel attacks [ 28 , 29 ]. The third assumption can be considered not impractical, since d -QKD with hybrid encoding has the similar experimental situation to prepare-and-measure QKD protocols like original BB84.…”
Section: Security Analysismentioning
confidence: 99%
“…Detector blinding attack with various blinding power [ 13 ] can threaten d -QKD with hybrid encoding as well as the original DDI-QKD [ 29 ]. However, since the attack requires a prior knowledge about the detectors, it is not compatible with assumption (iv).…”
Section: Security Analysismentioning
confidence: 99%
See 2 more Smart Citations