Artículo

González, P.; Rebón, L.; Ferreira da Silva, T.; Figueroa, M.; Saavedra, C.; Curty, M.; Lima, G.; Xavier, G.B.; Nogueira, W.A.T. "Quantum key distribution with untrusted detectors" (2015) Physical Review A - Atomic, Molecular, and Optical Physics. 92(2)
El editor solo permite decargar el artículo en su versión post-print desde el repositorio. Por favor, si usted posee dicha versión, enviela a
Consulte el artículo en la página del editor
Consulte la política de Acceso Abierto del editor

Abstract:

Side-channel attacks currently constitute the main challenge for quantum key distribution (QKD) to bridge theory with practice. So far two main approaches have been introduced to address this problem, (full) device-independent QKD and measurement-device-independent QKD. Here we present a third solution that might exceed the performance and practicality of the previous two in circumventing detector side-channel attacks, which arguably is the most hazardous part of QKD implementations. Our proposal has, however, one main requirement: the legitimate users of the system need to ensure that their labs do not leak any unwanted information to the outside. The security in the low-loss regime is guaranteed, while in the high-loss regime we already prove its robustness against some eavesdropping strategies. © 2015 American Physical Society.

Registro:

Documento: Artículo
Título:Quantum key distribution with untrusted detectors
Autor:González, P.; Rebón, L.; Ferreira da Silva, T.; Figueroa, M.; Saavedra, C.; Curty, M.; Lima, G.; Xavier, G.B.; Nogueira, W.A.T.
Filiación:Departamento de Física, Universidad de Concepción, Concepción, 160-C, Chile
Center for Optics and Photonics, Universidad de Concepción, Casilla, Concepción, 4016, Chile
MSI-Nucleus for Advanced Optics, Universidad de Concepció, Concepción, Chile
Instituto de Física de la Plata, Universidad Nacional de la Plata, La Plata, Argentina
Laboratorio de Procesado de Imágenes, Departamento de Física, Universidad de Buenos Aires, Buenos Aires, Argentina
Optical Metrology Division, National Institute of Metrology, Quality and Technology, Duque de Caxias, RJ, 25250-020, Brazil
Departamento de Ingeniería Eléctrica, Universidad de Concepción, Concepción, 160-C, Chile
EI Telecomunicación, Department of Signal Theory and Communications, University of Vigo, Vigo, E-36310, Spain
Departamento de Física, ICE, Universidade Federal de Juiz de for A, Juiz de Fora, CEP, 36036-330, Brazil
Palabras clave:Hardware security; Side channel attack; Bridge theories; Eavesdropping strategies; Legitimate users; Low-loss; Measurement device; Quantum cryptography
Año:2015
Volumen:92
Número:2
DOI: http://dx.doi.org/10.1103/PhysRevA.92.022337
Título revista:Physical Review A - Atomic, Molecular, and Optical Physics
Título revista abreviado:Phys Rev A
ISSN:10502947
CODEN:PLRAA
Registro:https://bibliotecadigital.exactas.uba.ar/collection/paper/document/paper_10502947_v92_n2_p_Gonzalez

Referencias:

  • Gisin, N., Ribordy, G., Tittel, W., Zbinden, H., (2002) Rev. Mod. Phys., 74, p. 145
  • Scarani, V., (2009) Rev. Mod. Phys., 81, p. 1301
  • Lo, H.-K., Curty, M., Tamaki, K., (2014) Nature Photon., 8, p. 595
  • Qi, B., Fung, C.-H.F., Lo, H.-K., Ma, X., (2007) Quantum Inf. Comput., 7, p. 73
  • Zhao, Y., Fred Fung, C.-H., Qi, B., Chen, C., Lo, H.-K., (2008) Phys. Rev. A, 78, p. 042333
  • Weier, H., (2011) New J. Phys., 13, p. 073024
  • Jouguet, P., Kunz-Jacques, S., Diamanti, E., (2013) Phys. Rev. A, 87, p. 062313
  • Jiang, M.-S., Sun, S.-H., Tang, G.-Z., Ma, X.-C., Li, C.-Y., Liang, L.-M., (2013) Phys. Rev. A, 88, p. 062335
  • Lydersen, L., (2010) Nature Photon., 4, p. 686
  • Gerhardt, I., (2011) Nature Commun., 2, p. 349
  • Fred Fung, C.-H., Qi, B., Tamaki, K., Lo, H.-K., (2007) Phys. Rev. A, 75, p. 032314
  • Nauerth, S., (2009) New J. Phys., 11, p. 065001
  • Xu, F., Qi, B., Lo, H.-K., (2010) New J. Phys., 12, p. 113026
  • Lamas-Linares, A., Kurtsiefer, C., (2007) Opt. Express, 15, p. 9388
  • Mayers, D., Yao, A.C.-C., (1998) Proceedings of the 39th Annual Symposium on Foundations of Computer Science (FOCS98), pp. 503-509. , in (IEEE Computer Society, Washington, DC), pp
  • Acín, A., Brunner, N., Gisin, N., Massar, S., Pironio, S., Scarani, V., (2007) Phys. Rev. Lett., 98, p. 230501
  • Reichardt, B.W., Unger, F., Vazirani, U., (2013) Nature (London), 496, p. 456
  • Vazirani, U., Vidick, T., (2014) Phys. Rev. Lett., 113, p. 140501
  • Braunstein, S.L., Pirandola, S., (2012) Phys. Rev. Lett., 108, p. 130502
  • Bell, J.S., (1964) Physics, 1, p. 195
  • Clauser, J.F., Horne, M.A., Shimony, A., Holt, R.A., (1969) Phys. Rev. Lett., 23, p. 880
  • Pearle, P., (1970) Phys. Rev. D, 2, p. 1418
  • Giustina, M., (2013) Nature (London), 497, p. 227
  • Christensen, B.G., (2013) Phys. Rev. Lett., 111, p. 130406
  • Cuevas, A., (2013) Nature Commun., 4, p. 2871
  • Gisin, N., Pironio, S., Sangouard, N., (2010) Phys. Rev. Lett., 105, p. 070501
  • Curty, M., Moroder, T., (2011) Phys. Rev. A, 84, p. 010304
  • Lo, H.-K., Curty, M., Qi, B., (2012) Phys. Rev. Lett., 108, p. 130503
  • Ma, X., Fred Fung, C.-H., Lo, H.-K., (2007) Phys. Rev. A, 76, p. 012307
  • Rubenok, A., Slater, J.A., Chan, P., Lucio-Martinez, I., Tittel, W., (2013) Phys. Rev. Lett., 111, p. 130501
  • Ferreira da Silva, T., Vitoreti, D., Xavier, G.B., Do Amaral, G.C., Temporão, G.P., Von Der Weid, J.P., (2013) Phys. Rev. A, 88, p. 052303
  • Liu, Y., (2013) Phys. Rev. Lett., 111, p. 130502
  • Tang, Z., Liao, Z., Xu, F., Qi, B., Qian, L., Lo, H.-K., (2014) Phys. Rev. Lett., 112, p. 190503
  • Tang, Y.-L., (2014) Phys. Rev. Lett., 113, p. 190501
  • Tang, Y.-L., (2015) IEEE J. Sel. Topics Quantum Elect., 21, p. 6600407
  • Curty, M., (2014) Nature Commun., 5, p. 4732
  • Qi, B., (2015) Phys. Rev. A, 91, p. 020303
  • Barrett, J., Colbeck, R., Kent, A., (2013) Phys. Rev. Lett., 110, p. 010503
  • Note, however, that this condition is not needed in mdiQKD where the measurement device can be even manufactured by Eve; Branciard, C., Cavalcanti, E.G., Walborn, S.P., Scarani, V., Wiseman, H.M., (2012) Phys. Rev. A, 85, p. 010301
  • Ma, X., arXiv:1410.5260; Lim, C.C.W., Korzh, B., Martin, A., Bussiéres, F., Thew, R., Zbinden, H., (2014) Appl. Phys. Lett., 105, p. 221112
  • Cao, W.-F., Zhen, Y.-Z., Zheng, Y.-L., Chen, Z.-B., Liu - N, L., Chen, K., Pan, J.-W., arXiv:1410.2928; Liang, W.-Y., Li, M., Yin, Z.-Q., Chen, W., Wang, S., An, X.-B., Guo, G.-C., Han, Z.-F., (2015) Phys. Rev. A, 92, p. 012319
  • Hwang, W.-Y., (2003) Phys. Rev. Lett., 91, p. 057901
  • Lo, H.-K., Ma, X., Chen, K., (2005) Phys. Rev. Lett., 94, p. 230504
  • Wang, X.-B., (2005) Phys. Rev. Lett., 94, p. 230503
  • Bennett, C.H., Brassard, G., (1984) Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, p. 175. , in (IEEE Press, Bangalore, India)
  • Boschi, D., Branca, S., De Martini, F., Hardy, L., Popescu, S., (1998) Phys. Rev. Lett., 80, p. 1121
  • Kim, Y.-H., (2003) Phys. Rev. A, 67, p. 040301
  • Fred Fung, C., Lo, H.-K., (2006) Phys. Rev. A, 74, p. 042342
  • Tamaki, K., Curty, M., Kato, G., Lo, H.-K., Azuma, K., (2014) Phys. Rev. A, 90, p. 052314
  • Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G., (2006) Phys. Rev. A, 73, p. 022320
  • Jain, N., Stiller, B., Khan, I., Makarov, V., Marquardt, C., Leuchs, G., (2015) IEEE J. Sel. Topics Quantum Elect., 21, p. 6600710
  • Biham, E., Huttner, B., Mor, T., (1996) Phys. Rev. A, 54, p. 2651
  • Inamori, H., (2002) Algorithmica, 34, p. 340
  • Lo, H.-K., Chau, H.F., (1999) Science, 283, p. 2050
  • Curty, M., Lewenstein, M., Lütkenhaus, N., (2004) Phys. Rev. Lett., 92, p. 217903
  • Curty, M., Gühne, O., Lewenstein, M., Lütkenhaus, N., (2005) Phys. Rev. A, 71, p. 022306
  • Gottesman, D., Lo, H.-K., Lütkenhaus, N., Preskill, J., (2004) Quantum Inf. Comput., 5, p. 325
  • Koashi, M., arXiv:quant-ph/0505108; Lo, H.-K., (2005) Quantum Inf. Comput., 5, p. 413
  • Lo, H.-K., Chau, H.F., Ardehali, M., (2005) J. Cryptology, 18, p. 133
  • Ma, X., Qi, B., Zhao, Y., Lo, H.-K., (2005) Phys. Rev. A, 72, p. 012326
  • Ferreira da Silva, T., Do Amaral, G.C., Xavier, G.B., Temporão, G.P., Von Der Weid, J.P., (2015) IEEE J. Selected Topics Quant. Electron., 21, p. 6600309
  • Ursin, R., (2007) Nature Phys., 3, p. 481
  • Ci Wen Lim, C., Curty, M., Walenta, N., Xu, F., Zbinden, H., (2014) Phys. Rev. A, 89, p. 022307

Citas:

---------- APA ----------
González, P., Rebón, L., Ferreira da Silva, T., Figueroa, M., Saavedra, C., Curty, M., Lima, G.,..., Nogueira, W.A.T. (2015) . Quantum key distribution with untrusted detectors. Physical Review A - Atomic, Molecular, and Optical Physics, 92(2).
http://dx.doi.org/10.1103/PhysRevA.92.022337
---------- CHICAGO ----------
González, P., Rebón, L., Ferreira da Silva, T., Figueroa, M., Saavedra, C., Curty, M., et al. "Quantum key distribution with untrusted detectors" . Physical Review A - Atomic, Molecular, and Optical Physics 92, no. 2 (2015).
http://dx.doi.org/10.1103/PhysRevA.92.022337
---------- MLA ----------
González, P., Rebón, L., Ferreira da Silva, T., Figueroa, M., Saavedra, C., Curty, M., et al. "Quantum key distribution with untrusted detectors" . Physical Review A - Atomic, Molecular, and Optical Physics, vol. 92, no. 2, 2015.
http://dx.doi.org/10.1103/PhysRevA.92.022337
---------- VANCOUVER ----------
González, P., Rebón, L., Ferreira da Silva, T., Figueroa, M., Saavedra, C., Curty, M., et al. Quantum key distribution with untrusted detectors. Phys Rev A. 2015;92(2).
http://dx.doi.org/10.1103/PhysRevA.92.022337