Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography

被引:7
|
作者
Bozzio, Mathieu [1 ,2 ]
Cavailles, Adrien [2 ]
Diamanti, Eleni [2 ]
Kent, Adrian [3 ,4 ]
Pitalua-Garcia, Damian [3 ]
机构
[1] Univ Vienna, Fac Phys, VCQ, Boltzmanngasse 5, A-1090 Vienna, Austria
[2] Sorbonne Univ, LIP6, CNRS, 4 Pl Jussieu, F-75005 Paris, France
[3] Univ Cambridge, Ctr Quantum Informat & Fdn, Ctr Math Sci, DAMTP, Wilberforce Rd, Cambridge CB3 0WA, England
[4] Perimeter Inst Theoret Phys, 31 Caroline St North, Waterloo, ON N2L 2Y5, Canada
来源
PRX QUANTUM | 2021年 / 2卷 / 03期
基金
英国工程与自然科学研究理事会;
关键词
DETECTOR CONTROL ATTACK; KEY DISTRIBUTION; BIT COMMITMENT; ROBUST COUNTERMEASURE; SECURITY; PROTOCOL; SYSTEMS; PROOF;
D O I
10.1103/PRXQuantum.2.030338
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and secure unforgeable tokens. Practical quantum implementations presently use photonic setups. In many such implementations, Alice sends photon pulses encoding quantum states and Bob chooses measurements on these states. In practice, Bob generally uses single-photon threshold detectors, which cannot distinguish the number of photons in detected pulses. Also, losses and other imperfections require Bob to report the detected pulses. Thus, malicious Alice can send and track multiphoton pulses and thereby gain information about Bob's measurement choices, violating the protocols' security. Here, we provide a theoretical framework for analyzing such multiphoton attacks, and present known and new attacks. We illustrate the power of these attacks with an experiment, and study their application to earlier experimental demonstrations of mistrustful quantum cryptography. We analyze countermeasures based on selective reporting and prove them inadequate. We also discuss side-channel attacks where Alice controls further degrees of freedom or sends other physical systems.
引用
收藏
页数:54
相关论文
共 50 条
  • [31] Multiclass Classification-Based Side-Channel Hybrid Attacks on Strong PUFs
    Liu, Wei
    Wang, Ruiming
    Qi, Xuyan
    Jiang, Liehui
    Jing, Jing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 924 - 937
  • [32] Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
    Renauld, Mathieu
    Standaert, Francois-Xavier
    Veyrat-Charvillon, Nicolas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 97 - 111
  • [33] Mitigating Timing-Based NoC Side-Channel Attacks With LLC Remapping
    Kar, Anurag
    Liu, Xueyang
    Kim, Yonghae
    Saileshwar, Gururaj
    Kim, Hyesoon
    Krishna, Tushar
    IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 22 (01) : 53 - 56
  • [34] Shared FPGAs and the Holy Grail: Protections against Side-Channel and Fault Attacks
    Glamocanin, Ognjen
    Mahmoud, Dina G.
    Regazzoni, Francesco
    Stojilovic, Mirjana
    PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 1645 - 1650
  • [35] Beware Your Standard Cells! On Their Role in Static Power Side-Channel Attacks
    Bhandari, Jitendra
    Mankali, Likhitha
    Nabeel, Mohammed
    Sinanoglu, Ozgur
    Karri, Ramesh
    Knechtel, Johann
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (12) : 4439 - 4452
  • [36] An Architecture-Independent Instruction Shuffler to Protect against Side-Channel Attacks
    Bayrak, Ali Galip
    Velickovic, Nikola
    Ienne, Paolo
    Burleson, Wayne
    ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2012, 8 (04)
  • [37] Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices
    Standaert, Francois-Xavier
    Gierlichs, Benedikt
    Verbauwhede, Ingrid
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 253 - +
  • [38] An Asynchronous MPGA THx2 Cell and Architecture for Mitigating Side-Channel Attacks
    Emmert, John M.
    Perumalla, Anvesh
    PROCEEDINGS OF THE 2019 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2019, : 232 - 235
  • [39] An Asynchronous FPGA THx2 Programmable Cell for Mitigating Side-Channel Attacks
    Emmert, John M.
    Perumalla, Anvesh
    Concha, Luis
    2020 IEEE 63RD INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2020, : 840 - 843
  • [40] Hardware Architecture Implemented on FPGA for Protecting Cryptographic Keys against Side-Channel Attacks
    Lumbiarres-Lopez, Ruben
    Lopez-Garcia, Mariano
    Canto-Navarro, Enrique
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) : 898 - 905