Inicio  /  Applied Sciences  /  Vol: 10 Par: 21 (2020)  /  Artículo
ARTÍCULO
TITULO

Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution

Yaxi Pan    
Ling Zhang and Duan Huang    

Resumen

As the existence of non-zero reflection coefficients in the real component of continuous-variable quantum key distribution (CV-QKD) systems, Eve can probe the system by sending the bright light pulses into Alice?s set-up. With the analysis of back-reflections, Eve only takes a few back-reflected photons to intercept information and obtain the raw key bit. In this paper, the attack problems are converted into the information leakage problems. First, we analyzed the Trojan horse attacks with different wavelengths and confirmed its side effects, such as crosstalk and anti-Stokes Raman scattering, by a numerical simulation. Then, based on the wavelength-dependent property of beam splitter, we presented a practical way to estimate the deviation of shot noise and therefore correct the excess noise by inserting different wavelength pulses under joint attacks. Finally, we specified the security bounds of the system through quantifying the excess noise bounds caused by the Trojan horse attacks and provided a theoretical reference for the secret key transmission of system. As a consequence, the transmission errors within the security bounds can be negligible and the legitimate users will not perceive the presence of Eve.

 Artículos similares

       
 
Viet Q. Vu, Minh-Quang Tran, Mohammed Amer, Mahesh Khatiwada, Sherif S. M. Ghoneim and Mahmoud Elsisi    
Facial mask detection technology has become increasingly important even beyond the context of the COVID-19 pandemic. Along with the advancement in facial recognition technology, face mask detection has become a crucial feature for various applications. T... ver más
Revista: Information

 
Alvina Ekua Ntefua Saah, Jurng-Jae Yee and Jae-Ho Choi    
The construction industry, characterized by its intricate network of stakeholders and diverse workforce, grapples with the challenge of managing information effectively. This study delves into this issue, recognizing the universal importance of safeguard... ver más
Revista: Applied Sciences

 
Vasiliki Demertzi, Stavros Demertzis and Konstantinos Demertzis    
The rapid advancements in technology have given rise to groundbreaking solutions and practical applications in the field of the Industrial Internet of Things (IIoT). These advancements have had a profound impact on the structures of numerous industrial o... ver más
Revista: Algorithms

 
Ou Ruan, Changwang Yan, Jing Zhou and Chaohao Ai    
Multiparty Private Set Intersection (MPSI) is dedicated to finding the intersection of datasets of multiple participants without disclosing any other information. Although many MPSI protocols have been presented, there are still some important practical ... ver más
Revista: Applied Sciences

 
Gabriel M. Carral, Jesús Liñares, Eduardo F. Mateo and Xesús Prieto-Blanco    
We analyze autocompensation possibilities in entanglement-based QKD protocols. In particular, we study the seminal BBM92 protocol and find that an autocompensating technique is possible, although with severe limitations. This prompts the introduction of ... ver más
Revista: Applied Sciences