Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography

被引:7
|
作者
Bozzio, Mathieu [1 ,2 ]
Cavailles, Adrien [2 ]
Diamanti, Eleni [2 ]
Kent, Adrian [3 ,4 ]
Pitalua-Garcia, Damian [3 ]
机构
[1] Univ Vienna, Fac Phys, VCQ, Boltzmanngasse 5, A-1090 Vienna, Austria
[2] Sorbonne Univ, LIP6, CNRS, 4 Pl Jussieu, F-75005 Paris, France
[3] Univ Cambridge, Ctr Quantum Informat & Fdn, Ctr Math Sci, DAMTP, Wilberforce Rd, Cambridge CB3 0WA, England
[4] Perimeter Inst Theoret Phys, 31 Caroline St North, Waterloo, ON N2L 2Y5, Canada
来源
PRX QUANTUM | 2021年 / 2卷 / 03期
基金
英国工程与自然科学研究理事会;
关键词
DETECTOR CONTROL ATTACK; KEY DISTRIBUTION; BIT COMMITMENT; ROBUST COUNTERMEASURE; SECURITY; PROTOCOL; SYSTEMS; PROOF;
D O I
10.1103/PRXQuantum.2.030338
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and secure unforgeable tokens. Practical quantum implementations presently use photonic setups. In many such implementations, Alice sends photon pulses encoding quantum states and Bob chooses measurements on these states. In practice, Bob generally uses single-photon threshold detectors, which cannot distinguish the number of photons in detected pulses. Also, losses and other imperfections require Bob to report the detected pulses. Thus, malicious Alice can send and track multiphoton pulses and thereby gain information about Bob's measurement choices, violating the protocols' security. Here, we provide a theoretical framework for analyzing such multiphoton attacks, and present known and new attacks. We illustrate the power of these attacks with an experiment, and study their application to earlier experimental demonstrations of mistrustful quantum cryptography. We analyze countermeasures based on selective reporting and prove them inadequate. We also discuss side-channel attacks where Alice controls further degrees of freedom or sends other physical systems.
引用
收藏
页数:54
相关论文
共 50 条
  • [21] Preventing Cache-Based Side-Channel Attacks in a Cloud Environment
    Godfrey, Michael
    Zulkernine, Mohammad
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (04) : 395 - 408
  • [22] Error-Tolerant Algebraic Side-Channel Attacks Using BEE
    Song, Ling
    Hu, Lei
    Sun, Siwei
    Zhang, Zhang
    Shi, Danping
    Hao, Ronglin
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 1 - 15
  • [23] Cloud Aid - A Cloud Computing Tool for Mitigating Side-Channel Attacks
    Gomes, Ricardo Bianchin
    Medina, Roseclea Duarte
    Moro, Fernando Gomes
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [24] Circuits and design techniques for secure ICs resistant to side-channel attacks
    Verbauwhede, I.
    Tiri, K.
    Hwang, D.
    Schaumont, P.
    2006 IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUIT DESIGN AND TECHNOLOGY, PROCEEDINGS, 2006, : 57 - +
  • [25] A New Model for Error-Tolerant Side-Channel Cube Attacks
    Li, Zhenqi
    Zhang, Bin
    Fan, Junfeng
    Verbauwhede, Ingrid
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 453 - 470
  • [26] Thwarting code-reuse and side-channel attacks in embedded systems
    Tsoupidi, Rodothea Myrsini
    Troubitsyna, Elena
    Papadimitratos, Panagiotis
    COMPUTERS & SECURITY, 2023, 133
  • [27] Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices
    Spreitzer, Raphael
    Moonsamy, Veelasha
    Korak, Thomas
    Mangard, Stefan
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01): : 465 - 488
  • [28] WHISPER: A Tool for Run-Time Detection of Side-Channel Attacks
    Mushtaq, Maria
    Bricq, Jeremy
    Bhatti, Muhammad Khurram
    Akram, Ayaz
    Lapotre, Vianney
    Gogniat, Guy
    Benoit, Pascal
    IEEE ACCESS, 2020, 8 : 83871 - 83900
  • [29] PWRLEAK: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV
    Wang, Wubing
    Li, Mengyuan
    Zhang, Yinqian
    Lin, Zhiqiang
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2023, 2023, 13959 : 46 - 66
  • [30] Aiding side-channel attacks on cryptographic software with satisfiability-based analysis
    Potlapally, Nachiketh R.
    Raghunathan, Anand
    Ravi, Srivaths
    Jha, Niraj K.
    Lee, Ruby B.
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2007, 15 (04) : 465 - 470