Trojan-horse attacks on quantum-key-distribution systems
Top Cited Papers
- 13 February 2006
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review A
- Vol. 73 (2) , 022320
- https://doi.org/10.1103/physreva.73.022320
Abstract
General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob’s system via the quantum channel, are analyzed. We illustrate the power of such attacks with today’s technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems.Keywords
All Related Versions
This publication has 16 references indexed in Scilit:
- Lower and Upper Bounds on the Secret-Key Rate for Quantum Key Distribution Protocols Using One-Way Classical CommunicationPhysical Review Letters, 2005
- Unconditional Security of Coherent-State Quantum Key Distribution with a Strong Phase-Reference PulsePhysical Review Letters, 2004
- Photon-Counting OTDR for Local Birefringence and Fault Analysis in the Metro EnvironmentJournal of Lightwave Technology, 2004
- Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse ImplementationsPhysical Review Letters, 2004
- Quantum Key Distribution with High Loss: Toward Global Secure CommunicationPhysical Review Letters, 2003
- Quantum cryptographyReviews of Modern Physics, 2002
- Simple Proof of Security of the BB84 Quantum Key Distribution ProtocolPhysical Review Letters, 2000
- Automated ‘plug & play’ quantumkey distributionElectronics Letters, 1998
- Performance analysis preclipping AM/QAM hybrid lightwave systemsJournal of Lightwave Technology, 1997
- Quantum cryptography with coherent statesPhysical Review A, 1995