Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography
نویسندگان
چکیده
Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and unforgeable tokens. Practical quantum implementations presently use photonic setups. In many such implementations, Alice sends photon pulses encoding states Bob chooses measurements on these states. practice, generally uses single threshold detectors, which cannot distinguish the number of photons in detected pulses. Also, losses other imperfections require to report Thus, malicious can send track multiphoton thereby gain information about Bob's measurement choices, violating protocols' security. Here, we provide a theoretical framework for analysing attacks, present known new attacks. We illustrate power attacks with an experiment, study their application earlier experimental demonstrations mistrustful cryptography. analyse countermeasures based selective reporting prove them inadequate. also discuss side-channel where controls further degrees freedom or physical systems.
منابع مشابه
Side channel attacks in code-based cryptography
The McEliece and the Niederreiter public key cryptosystems (PKC) are supposed secure in a post quantum world [4] because there is no efficient quantum algorithm for the underlying problems upon which these cryptosystems are built. The CFS, Stern and KKS signature schemes are post-quantum secure because they are based on hard problems of coding theory. The purpose of this article is to describe ...
متن کاملQuantum non-locality, causality and mistrustful cryptography
Here we propose a general relativistic quantum framework for mistrustful cryptography that exploits the fascinating connection of quantum non-locality and special theory of relativity with cryptography. The underlying principle of unconditional security is two-fold quantum non-local correlations: first entanglement swapping and then teleportation. The proposed framework has following remarkable...
متن کاملImproved Side Channel Attacks on Pairing Based Cryptography
Several known invasive and non-invasive attacks against pairing algorithms only work if the second but not if the rst argument of the pairing is the secret. In this paper we extend some of these attacks to the case where the rst argument is the secret. Hence we conclude that positioning the secret as the rst argument of the pairing does not necessarily improve the security against side channel ...
متن کاملImproving Side-Channel Attacks Against Pairing-Based Cryptography
Although the vulnerability of pairing-based algorithms to side-channel attacks has been demonstrated—pairing implementations were targeted on three different devices in a recent paper [41]—it nevertheless remains difficult to choose an adapted leakage model and detect points of interest. Our proposed approach evaluates the parameters of the attack and validates the data processing workflow. We ...
متن کاملA proposal for founding mistrustful quantum cryptography on coin tossing
ly, the basic idea is this. A and B identify some suitable graded class C = ⊕n≥0Cn of mathematical objects with the property that there is some increasing function f(n) such that the members of Cn can be identified by f(n) bits. They also identify a classD = ⊕n≥0Dn of mathematical objects, with a relation → defining a subset of D × C: we say d ∈ D is associated to c ∈ C if d → c. Before impleme...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: PRX quantum
سال: 2021
ISSN: ['2691-3399']
DOI: https://doi.org/10.1103/prxquantum.2.030338