Side-Channel-Free Quantum Key Distribution
نویسندگان
چکیده
منابع مشابه
Side-channel-free quantum key distribution.
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the rel...
متن کاملQuantum Key Search with Side Channel Advice
Recently, a number of results have been published that show how to combine classical cryptanalysis with quantum algorithms, thereby (potentially) achieving considerable speed-ups. We follow this trend but add a novel twist by considering how to utilise side channel leakage in a quantum setting. This is non-trivial because Grover’s algorithm deals with unstructured data, however we are intereste...
متن کاملFree-space quantum key distribution
Quantum cryptography was introduced in the mid1980s [1] as a new method for generating the shared, secret random number sequences, or cryptographic keys, that are used in crypto-systems to provide communications security. The appeal of quantum cryptography is that its security is based on laws of Nature, in contrast to existing methods of key distribution that derive their security from the per...
متن کاملFree-Space Quantum Key Distribution
Quantum key distribution is the most advanced technology to arise from the emerging field of quantum information. In fact, a few companies (MaqiQ Technologies and id Quantique) already offer commercial quantum key distribution products. But why so much excitement over QKD when our standard techniques serve just fine? Well the thing is that our standard techniques are safe only under certain ass...
متن کاملSide-channel free quantum key distribution by Samuel L. Braunstein and Stefano Pirandola IN DEFENSE OF PRIVATE SPACES
In quantum cryptography unconditional security proofs are derived under the assumption that Alice's and Bob's apparata (private spaces) are completely inaccessible by an eavesdropper who, therefore, can only attack the signal systems which are transmitted through the quantum communication channel connecting the two parties. Under this assumption, secret-key rates and security thresholds are der...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review Letters
سال: 2012
ISSN: 0031-9007,1079-7114
DOI: 10.1103/physrevlett.108.130502