Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system

Cited 4 time in webofscience Cited 0 time in scopus
  • Hit : 575
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKo, Heasinko
dc.contributor.authorLim, Kyongchunko
dc.contributor.authorOh, Junsangko
dc.contributor.authorRhee, June-Koo Kevinko
dc.date.accessioned2016-11-09T08:24:23Z-
dc.date.available2016-11-09T08:24:23Z-
dc.date.created2016-10-31-
dc.date.created2016-10-31-
dc.date.issued2016-10-
dc.identifier.citationQUANTUM INFORMATION PROCESSING, v.15, no.10, pp.4265 - 4282-
dc.identifier.issn1570-0755-
dc.identifier.urihttp://hdl.handle.net/10203/213987-
dc.description.abstractQuantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance-
dc.languageEnglish-
dc.publisherSPRINGER-
dc.subjectCRYPTOGRAPHY-
dc.subjectSECURITY-
dc.titleInformatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system-
dc.typeArticle-
dc.identifier.wosid000383587100021-
dc.identifier.scopusid2-s2.0-84980002647-
dc.type.rimsART-
dc.citation.volume15-
dc.citation.issue10-
dc.citation.beginningpage4265-
dc.citation.endingpage4282-
dc.citation.publicationnameQUANTUM INFORMATION PROCESSING-
dc.identifier.doi10.1007/s11128-016-1400-2-
dc.contributor.localauthorRhee, June-Koo Kevin-
dc.contributor.nonIdAuthorKo, Heasin-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorQuantum key distribution-
dc.subject.keywordAuthorSide channel attack-
dc.subject.keywordAuthorTrojan horse attack-
dc.subject.keywordPlusCRYPTOGRAPHY-
dc.subject.keywordPlusSECURITY-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 4 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0