UNIGE document Scientific Article
previous document  unige:36776  next document
add to browser collection

Trojan-horse attacks on quantum-key-distribution systems

Published in Physical Review. A. 2006, vol. 73, no. 2
Abstract General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob’s system via the quantum channel, are analyzed. We illustrate the power of such attacks with today’s technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems.
Full text
(ISO format)
GISIN, Nicolas et al. Trojan-horse attacks on quantum-key-distribution systems. In: Physical Review. A, 2006, vol. 73, n° 2. https://archive-ouverte.unige.ch/unige:36776

220 hits



Deposited on : 2014-05-20

Export document
Format :
Citation style :