Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography

被引:7
|
作者
Bozzio, Mathieu [1 ,2 ]
Cavailles, Adrien [2 ]
Diamanti, Eleni [2 ]
Kent, Adrian [3 ,4 ]
Pitalua-Garcia, Damian [3 ]
机构
[1] Univ Vienna, Fac Phys, VCQ, Boltzmanngasse 5, A-1090 Vienna, Austria
[2] Sorbonne Univ, LIP6, CNRS, 4 Pl Jussieu, F-75005 Paris, France
[3] Univ Cambridge, Ctr Quantum Informat & Fdn, Ctr Math Sci, DAMTP, Wilberforce Rd, Cambridge CB3 0WA, England
[4] Perimeter Inst Theoret Phys, 31 Caroline St North, Waterloo, ON N2L 2Y5, Canada
来源
PRX QUANTUM | 2021年 / 2卷 / 03期
基金
英国工程与自然科学研究理事会;
关键词
DETECTOR CONTROL ATTACK; KEY DISTRIBUTION; BIT COMMITMENT; ROBUST COUNTERMEASURE; SECURITY; PROTOCOL; SYSTEMS; PROOF;
D O I
10.1103/PRXQuantum.2.030338
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and secure unforgeable tokens. Practical quantum implementations presently use photonic setups. In many such implementations, Alice sends photon pulses encoding quantum states and Bob chooses measurements on these states. In practice, Bob generally uses single-photon threshold detectors, which cannot distinguish the number of photons in detected pulses. Also, losses and other imperfections require Bob to report the detected pulses. Thus, malicious Alice can send and track multiphoton pulses and thereby gain information about Bob's measurement choices, violating the protocols' security. Here, we provide a theoretical framework for analyzing such multiphoton attacks, and present known and new attacks. We illustrate the power of these attacks with an experiment, and study their application to earlier experimental demonstrations of mistrustful quantum cryptography. We analyze countermeasures based on selective reporting and prove them inadequate. We also discuss side-channel attacks where Alice controls further degrees of freedom or sends other physical systems.
引用
收藏
页数:54
相关论文
共 50 条
  • [41] Leakage-Resilient Anonymous Multireceiver Certificateless Encryption Resistant to Side-Channel Attacks
    Xie, Jia-Yi
    Tseng, Yuh-Min
    Huang, Sen-Shan
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2674 - 2685
  • [42] Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    IEEE ACCESS, 2019, 7 : 19041 - 19053
  • [43] Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks
    Al-Shareeda, Mahmood A.
    Manickam, Selvakumar
    Mohammed, Badiea Abdulkarem
    Al-Mekhlafi, Zeyad Ghaleb
    Qtaish, Amjad
    Alzahrani, Abdullah J.
    Alshammari, Gharbi
    Sallam, Amer A.
    Almekhlafi, Khalil
    APPLIED SCIENCES-BASEL, 2022, 12 (12):
  • [44] Gaussian two-mode attacks in one-way quantum cryptography
    Ottaviani, Carlo
    Mancini, Stefano
    Pirandola, Stefano
    PHYSICAL REVIEW A, 2017, 95 (05)
  • [45] Static and Dynamic Obfuscations of Scan Data Against Scan-Based Side-Channel Attacks
    Cui, Aijiao
    Luo, Yanhui
    Chang, Chip-Hong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (02) : 363 - 376
  • [46] Winter is here! A decade of cache-based side-channel attacks, detection & mitigation for RSA
    Mushtaq, Maria
    Mukhtar, Muhammad Asim
    Lapotre, Vianney
    Bhatti, Muhammad Khurram
    Gogniat, Guy
    INFORMATION SYSTEMS, 2020, 92
  • [47] Design and Verification of Secure Cache Wrapper against Access-driven Side-Channel Attacks
    Niazmand, Behrad
    Azad, Siavoosh Payandeh
    Jervan, Gert
    Sepulveda, Johanna
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 672 - 676
  • [48] Countermeasures for timing-based side-channel attacks against shared, modern computing hardware
    Montasari, Reza
    Hill, Richard
    Hosseinian-Far, Amin
    Montaseri, Farshad
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2019, 11 (03) : 294 - 320
  • [49] Side-channel attacks against the human brain: the PIN code case study (extended version)
    Lange J.
    Massart C.
    Mouraux A.
    Standaert F.-X.
    Brain Informatics, 2018, 5 (2)
  • [50] REHAD: Using Low-Frequency Reconfigurable Hardware for Cache Side-Channel Attacks Detection
    Mao, Yuxiao
    Migliore, Vincent
    Nicomette, Vincent
    2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, : 704 - 709