2015
DOI: 10.1103/physrevx.5.031030
|View full text |Cite
|
Sign up to set email alerts
|

Practical Security Bounds Against the Trojan-Horse Attack in Quantum Key Distribution

Abstract: In the quantum version of a Trojan-horse attack, photons are injected into the optical modules of a quantum key distribution system in an attempt to read information direct from the encoding devices. To stop the Trojan photons, the use of passive optical components has been suggested. However, to date, there is no quantitative bound that specifies such components in relation to the security of the system. Here, we turn the Trojan-horse attack into an information leakage problem. This allows us quantify the sys… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

4
176
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 130 publications
(180 citation statements)
references
References 61 publications
4
176
0
Order By: Relevance
“…Attenuation-based defense systems, which aim to muddy the phase information on Eve's state by blocking most of the incoming attack state, have been previously analysed by Lucamarini et al [18]. In their analysis, it was assumed that Eve would send in a pure coherent state, which is by necessity separable.…”
Section: Gaussian State Attackmentioning
confidence: 99%
See 3 more Smart Citations
“…Attenuation-based defense systems, which aim to muddy the phase information on Eve's state by blocking most of the incoming attack state, have been previously analysed by Lucamarini et al [18]. In their analysis, it was assumed that Eve would send in a pure coherent state, which is by necessity separable.…”
Section: Gaussian State Attackmentioning
confidence: 99%
“…This may be done by way of some defense such as an optical fuse [25], which melts when sufficiently many photons pass through it, or by identifying some other component which will be irreversibly damaged when subject to a bright enough light [26]. A more detailed examination of the numbers and figures behind such defenses may be found in [18], but for our purposes we may simply assume that there does exist some bound N such that n ρ ≡ Tr [nρ] < N , wheren =â †â . Another relevant property may be the purity of the state ρ η after passing through the attenuator.…”
Section: A State Descriptionmentioning
confidence: 99%
See 2 more Smart Citations
“…In that sense, our work significantly adds to the advantages of upconversion technology for practical QKD systems. It also joins the growing body of countermeasures [41,42] and novel schemes, such as MDI-QKD [23], conceived in order to heal the Achilles' heel of QKD [43]: the (vulnerable) photon detection system, without compromising on performance.…”
Section: Introductionmentioning
confidence: 99%