期刊
QUANTUM INFORMATION PROCESSING
卷 14, 期 2, 页码 681-686出版社
SPRINGER
DOI: 10.1007/s11128-014-0872-1
关键词
Quantum key distribution; Semi-quantum; Trojan-horse attack; Practical security
资金
- National Natural Science Foundation of China [61003290]
- Beijing Natural Science Foundation [4122008, 4122012]
- Importation and Development of High-Caliber Talents Project of Beijing Municipal Institutions [CITTCD201304039]
- National Cipher Development Fund during the 12th Five-Year Plan Period [MMJJ201401006]
Recently, Boyer et al. (Phys Rev Lett 99:140501, 2007) introduced a conceptually novel semi-quantum key distribution scheme (BKM07). Tan et al. (Phys Rev Lett 102:098901, 2009) showed that classical Bob is unable to detect Eve's eavesdropping by giving a special implementation of BKM07 protocol. In the reply, Boyer et al. (Phys Rev Lett 102:098902, 2009) gave a solution against the eavesdropping, i.e., Bob may place a filter that allows only photons with approximately specific frequency to pass just at the expected time . However, their improvement contradicts the descriptions about classical. If the assumption of classical is not considered, we give a delay-photon Trojan-horse attack on BKM07 protocol and its improvement and further present a possible improvement.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据