Scientific article
OA Policy
English

Trojan-horse attacks on quantum-key-distribution systems

Publication date2006
Abstract

General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems.

Citation (ISO format)
GISIN, Nicolas et al. Trojan-horse attacks on quantum-key-distribution systems. In: Physical review, A, Atomic, molecular, and optical physics, 2006, vol. 73, n° 2. doi: 10.1103/PhysRevA.73.022320
Main files (1)
Article (Published version)
accessLevelPublic
Identifiers
Journal ISSN1050-2947
733views
573downloads

Technical informations

Creation19/05/2014 13:24:00
First validation19/05/2014 13:24:00
Update time14/03/2023 21:14:55
Status update14/03/2023 21:14:55
Last indexation30/10/2024 17:18:55
All rights reserved by Archive ouverte UNIGE and the University of GenevaunigeBlack