4.8 Article

Memory Attacks on Device-Independent Quantum Cryptography

Journal

PHYSICAL REVIEW LETTERS
Volume 110, Issue 1, Pages -

Publisher

AMER PHYSICAL SOC
DOI: 10.1103/PhysRevLett.110.010503

Keywords

-

Funding

  1. EPSRC
  2. CHIST-ERA DIQIP project
  3. Swiss National Science Foundation [PP00P2-128455, 20CH21-138799]
  4. National Centre of Competence in Research Quantum Science and Technology.''
  5. Leverhulme Research Fellowship
  6. John Templeton Foundation
  7. EU [255961]
  8. Perimeter Institute for Theoretical Physics
  9. Government of Canada through Industry Canada
  10. Province of Ontario through the Ministry of Research and Innovation
  11. EPSRC [EP/G004544/1, EP/J008249/2, EP/G004544/2, EP/J008249/1, EP/G004544/3] Funding Source: UKRI
  12. Engineering and Physical Sciences Research Council [EP/G004544/2, EP/G004544/1, EP/J008249/1, EP/G004544/3, EP/J008249/2] Funding Source: researchfish

Ask authors/readers for more resources

Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage, or device degradation, this idea has excited much interest, and many device-independent schemes have been proposed. Here we identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Untrusted devices may record their inputs and outputs and reveal information about them via publicly discussed outputs during later runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data. Possible defenses include securely destroying or isolating used devices. However, these are costly and often impractical. We propose other more practical partial defenses as well as a new protocol structure for device-independent quantum key distribution that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each other (and no other party). DOI: 10.1103/PhysRevLett.110.010503

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available