2018
DOI: 10.1007/s11128-018-1892-z
|View full text |Cite
|
Sign up to set email alerts
|

On the security of semi-device-independent QKD protocols

Abstract: While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for an upper bound on the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent quantum hacking attacks wherei… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…Given a more promising for practical realization variant of this scheme exists, one should consider its robust version that can be realized in the laboratory, including all side effects that may potentially open it for the attacks of hackers. This aspect of the SDI QKD has been recently studied in [35,67,[69][70][71].…”
Section: Discussionmentioning
confidence: 99%
“…Given a more promising for practical realization variant of this scheme exists, one should consider its robust version that can be realized in the laboratory, including all side effects that may potentially open it for the attacks of hackers. This aspect of the SDI QKD has been recently studied in [35,67,[69][70][71].…”
Section: Discussionmentioning
confidence: 99%
“…A possible attack on a wide class of protocols is for the eavesdropper, Eve, to intercept some of the transmitted states, perform some action on them, and in place pass (resend) some quantum states to Bob. The passed state can either be transformed [59,60], or Eve can measure the intercepted state and prepare a new one [61], or use some implementation-dependent attacks [62][63][64][65][66].…”
Section: Intercept and Resend Attacks In Quantum Cryptographymentioning
confidence: 99%
“…The eavesdroppers in quantum channel not only construct the devices used by the communicating party other than capable of vaguely modifying their actions. So Chaturvedi et al [23] proposed the SDIQKD protocol, which can analyze the quantum hacking attack and it finds the best solution. Also, their analysis is robust and deals with the worst scenario in many cases.…”
Section: Related Workmentioning
confidence: 99%