4.7 Article

Trojan-horse attacks on quantum key distribution with classical Bob

期刊

QUANTUM INFORMATION PROCESSING
卷 14, 期 2, 页码 681-686

出版社

SPRINGER
DOI: 10.1007/s11128-014-0872-1

关键词

Quantum key distribution; Semi-quantum; Trojan-horse attack; Practical security

资金

  1. National Natural Science Foundation of China [61003290]
  2. Beijing Natural Science Foundation [4122008, 4122012]
  3. Importation and Development of High-Caliber Talents Project of Beijing Municipal Institutions [CITTCD201304039]
  4. National Cipher Development Fund during the 12th Five-Year Plan Period [MMJJ201401006]

向作者/读者索取更多资源

Recently, Boyer et al. (Phys Rev Lett 99:140501, 2007) introduced a conceptually novel semi-quantum key distribution scheme (BKM07). Tan et al. (Phys Rev Lett 102:098901, 2009) showed that classical Bob is unable to detect Eve's eavesdropping by giving a special implementation of BKM07 protocol. In the reply, Boyer et al. (Phys Rev Lett 102:098902, 2009) gave a solution against the eavesdropping, i.e., Bob may place a filter that allows only photons with approximately specific frequency to pass just at the expected time . However, their improvement contradicts the descriptions about classical. If the assumption of classical is not considered, we give a delay-photon Trojan-horse attack on BKM07 protocol and its improvement and further present a possible improvement.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据