咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Quantum hacking of two-way con... 收藏

Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack

Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack

作     者:马鸿鑫 鲍皖苏 李宏伟 周淳 

作者机构:PLA Information Engineering University Zhengzhou 450001 China Synergetic Innovation Center of Quantum Information and Quantum Physics University of Science and Technology of China Hefei 230026 China 

出 版 物:《Chinese Physics B》 (中国物理B(英文版))

年 卷 期:2016年第25卷第8期

页      面:65-70页

核心收录:

学科分类:11[军事学] 1105[军事学-军队指挥学] 07[理学] 0839[工学-网络空间安全] 08[工学] 0805[工学-材料科学与工程(可授工学、理学学位)] 070201[理学-理论物理] 110505[军事学-密码学] 0704[理学-天文学] 110503[军事学-军事通信学] 0702[理学-物理学] 

基  金:supported by the National Basic Research Program of China(Grant No.2013CB338002) the National Natural Science Foundation of China(Grant Nos.11304397 and 61505261) 

主  题:quantum hacking two-way continuous-variable quantum key distribution Trojan-horse 

摘      要:We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分