Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography

نویسندگان

چکیده

Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and unforgeable tokens. Practical quantum implementations presently use photonic setups. In many such implementations, Alice sends photon pulses encoding states Bob chooses measurements on these states. practice, generally uses single threshold detectors, which cannot distinguish the number of photons in detected pulses. Also, losses other imperfections require to report Thus, malicious can send track multiphoton thereby gain information about Bob's measurement choices, violating protocols' security. Here, we provide a theoretical framework for analysing attacks, present known new attacks. We illustrate power attacks with an experiment, study their application earlier experimental demonstrations mistrustful cryptography. analyse countermeasures based selective reporting prove them inadequate. also discuss side-channel where controls further degrees freedom or physical systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Side channel attacks in code-based cryptography

The McEliece and the Niederreiter public key cryptosystems (PKC) are supposed secure in a post quantum world [4] because there is no efficient quantum algorithm for the underlying problems upon which these cryptosystems are built. The CFS, Stern and KKS signature schemes are post-quantum secure because they are based on hard problems of coding theory. The purpose of this article is to describe ...

متن کامل

Quantum non-locality, causality and mistrustful cryptography

Here we propose a general relativistic quantum framework for mistrustful cryptography that exploits the fascinating connection of quantum non-locality and special theory of relativity with cryptography. The underlying principle of unconditional security is two-fold quantum non-local correlations: first entanglement swapping and then teleportation. The proposed framework has following remarkable...

متن کامل

Improved Side Channel Attacks on Pairing Based Cryptography

Several known invasive and non-invasive attacks against pairing algorithms only work if the second but not if the rst argument of the pairing is the secret. In this paper we extend some of these attacks to the case where the rst argument is the secret. Hence we conclude that positioning the secret as the rst argument of the pairing does not necessarily improve the security against side channel ...

متن کامل

Improving Side-Channel Attacks Against Pairing-Based Cryptography

Although the vulnerability of pairing-based algorithms to side-channel attacks has been demonstrated—pairing implementations were targeted on three different devices in a recent paper [41]—it nevertheless remains difficult to choose an adapted leakage model and detect points of interest. Our proposed approach evaluates the parameters of the attack and validates the data processing workflow. We ...

متن کامل

A proposal for founding mistrustful quantum cryptography on coin tossing

ly, the basic idea is this. A and B identify some suitable graded class C = ⊕n≥0Cn of mathematical objects with the property that there is some increasing function f(n) such that the members of Cn can be identified by f(n) bits. They also identify a classD = ⊕n≥0Dn of mathematical objects, with a relation → defining a subset of D × C: we say d ∈ D is associated to c ∈ C if d → c. Before impleme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: PRX quantum

سال: 2021

ISSN: ['2691-3399']

DOI: https://doi.org/10.1103/prxquantum.2.030338