Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Trojan-horse attacks on quantum-key-distribution systems

Journal Article · · Physical Review. A
; ; ;  [1];  [2]
  1. Group of Applied Physics, University of Geneva, 1211 Geneva 4 (Switzerland)
  2. id Quantique SA, 3 Ch. de la Marbrerie, 1227 Carouge/Geneva (Switzerland)

General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems.

OSTI ID:
20974536
Journal Information:
Physical Review. A, Journal Name: Physical Review. A Journal Issue: 2 Vol. 73; ISSN 1050-2947; ISSN PLRAAN
Country of Publication:
United States
Language:
English

Similar Records

Improving the security of multiparty quantum secret sharing against Trojan horse attack
Journal Article · Sat Oct 15 00:00:00 EDT 2005 · Physical Review. A · OSTI ID:20718822

Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel
Journal Article · Fri Feb 28 23:00:00 EST 2003 · Physical Review. A · OSTI ID:20633825

Phase-remapping attack in practical quantum-key-distribution systems
Journal Article · Thu Mar 15 00:00:00 EDT 2007 · Physical Review. A · OSTI ID:20982260