Quantum key distribution with untrusted detectors

Side-channel attacks currently constitute the main challenge for quantum key distribution (QKD) to bridge theory with practice. So far two main approaches have been introduced to address this problem, (full) device-independent QKD and measurement-device-independent QKD. Here we present a third solut...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: González, P., Rebón, Lorena, Ferreira da Silva, T., Figueroa, Miguel, Saavedra, Carlos, Curty, Marcos, Lima, G., Xavier, Guilherme B., Nogueira, W. A. T.
Formato: Articulo
Lenguaje:Inglés
Publicado: 2015
Materias:
Acceso en línea:http://sedici.unlp.edu.ar/handle/10915/125859
Aporte de:
id I19-R120-10915-125859
record_format dspace
institution Universidad Nacional de La Plata
institution_str I-19
repository_str R-120
collection SEDICI (UNLP)
language Inglés
topic Física
Physics
Quantum cryptography
Implementation
Eavesdropping
Computer security
Quantum information science
Detector
Quantum key distribution
Robustness (computer science)
spellingShingle Física
Physics
Quantum cryptography
Implementation
Eavesdropping
Computer security
Quantum information science
Detector
Quantum key distribution
Robustness (computer science)
González, P.
Rebón, Lorena
Ferreira da Silva, T.
Figueroa, Miguel
Saavedra, Carlos
Curty, Marcos
Lima, G.
Xavier, Guilherme B.
Nogueira, W. A. T.
Quantum key distribution with untrusted detectors
topic_facet Física
Physics
Quantum cryptography
Implementation
Eavesdropping
Computer security
Quantum information science
Detector
Quantum key distribution
Robustness (computer science)
description Side-channel attacks currently constitute the main challenge for quantum key distribution (QKD) to bridge theory with practice. So far two main approaches have been introduced to address this problem, (full) device-independent QKD and measurement-device-independent QKD. Here we present a third solution that might exceed the performance and practicality of the previous two in circumventing detector side-channel attacks, which arguably is the most hazardous part of QKD implementations. Our proposal has, however, one main requirement: the legitimate users of the system need to ensure that their labs do not leak any unwanted information to the outside. The security in the low-loss regime is guaranteed, while in the high-loss regime we already prove its robustness against some eavesdropping strategies.
format Articulo
Articulo
author González, P.
Rebón, Lorena
Ferreira da Silva, T.
Figueroa, Miguel
Saavedra, Carlos
Curty, Marcos
Lima, G.
Xavier, Guilherme B.
Nogueira, W. A. T.
author_facet González, P.
Rebón, Lorena
Ferreira da Silva, T.
Figueroa, Miguel
Saavedra, Carlos
Curty, Marcos
Lima, G.
Xavier, Guilherme B.
Nogueira, W. A. T.
author_sort González, P.
title Quantum key distribution with untrusted detectors
title_short Quantum key distribution with untrusted detectors
title_full Quantum key distribution with untrusted detectors
title_fullStr Quantum key distribution with untrusted detectors
title_full_unstemmed Quantum key distribution with untrusted detectors
title_sort quantum key distribution with untrusted detectors
publishDate 2015
url http://sedici.unlp.edu.ar/handle/10915/125859
work_keys_str_mv AT gonzalezp quantumkeydistributionwithuntrusteddetectors
AT rebonlorena quantumkeydistributionwithuntrusteddetectors
AT ferreiradasilvat quantumkeydistributionwithuntrusteddetectors
AT figueroamiguel quantumkeydistributionwithuntrusteddetectors
AT saavedracarlos quantumkeydistributionwithuntrusteddetectors
AT curtymarcos quantumkeydistributionwithuntrusteddetectors
AT limag quantumkeydistributionwithuntrusteddetectors
AT xavierguilhermeb quantumkeydistributionwithuntrusteddetectors
AT nogueirawat quantumkeydistributionwithuntrusteddetectors
bdutipo_str Repositorios
_version_ 1764820452375527424