pith. machine review for the scientific record. sign in

arxiv: 1607.05814 · v1 · submitted 2016-07-20 · 🪐 quant-ph

Recognition: unknown

Insecurity of detector-device-independent quantum key distribution

Authors on Pith no claims yet
classification 🪐 quant-ph
keywords ddiqkdattacksdetectordetector-device-independentdistributionquantumsecurityapparatuses
0
0 comments X
read the original abstract

Detector-device-independent quantum key distribution (ddiQKD) held the promise of being robust to detector side-channels, a major security loophole in QKD implementations. In contrast to what has been claimed, however, we demonstrate that the security of ddiQKD is not based on post-selected entanglement, and we introduce various eavesdropping strategies that show that ddiQKD is in fact insecure against detector side-channel attacks as well as against other attacks that exploit device's imperfections of the receiver. Our attacks are valid even when the QKD apparatuses are built by the legitimate users of the system themselves, and thus free of malicious modifications, which is a key assumption in ddiQKD.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.