Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography

被引:6
|
作者
Bozzio, Mathieu [1 ,2 ]
Cavailles, Adrien [2 ]
Diamanti, Eleni [2 ]
Kent, Adrian [3 ,4 ]
Pitalua-Garcia, Damian [3 ]
机构
[1] Univ Vienna, Fac Phys, VCQ, Boltzmanngasse 5, A-1090 Vienna, Austria
[2] Sorbonne Univ, LIP6, CNRS, 4 Pl Jussieu, F-75005 Paris, France
[3] Univ Cambridge, Ctr Quantum Informat & Fdn, Ctr Math Sci, DAMTP, Wilberforce Rd, Cambridge CB3 0WA, England
[4] Perimeter Inst Theoret Phys, 31 Caroline St North, Waterloo, ON N2L 2Y5, Canada
来源
PRX QUANTUM | 2021年 / 2卷 / 03期
基金
英国工程与自然科学研究理事会;
关键词
DETECTOR CONTROL ATTACK; KEY DISTRIBUTION; BIT COMMITMENT; ROBUST COUNTERMEASURE; SECURITY; PROTOCOL; SYSTEMS; PROOF;
D O I
10.1103/PRXQuantum.2.030338
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and secure unforgeable tokens. Practical quantum implementations presently use photonic setups. In many such implementations, Alice sends photon pulses encoding quantum states and Bob chooses measurements on these states. In practice, Bob generally uses single-photon threshold detectors, which cannot distinguish the number of photons in detected pulses. Also, losses and other imperfections require Bob to report the detected pulses. Thus, malicious Alice can send and track multiphoton pulses and thereby gain information about Bob's measurement choices, violating the protocols' security. Here, we provide a theoretical framework for analyzing such multiphoton attacks, and present known and new attacks. We illustrate the power of these attacks with an experiment, and study their application to earlier experimental demonstrations of mistrustful quantum cryptography. We analyze countermeasures based on selective reporting and prove them inadequate. We also discuss side-channel attacks where Alice controls further degrees of freedom or sends other physical systems.
引用
收藏
页数:54
相关论文
共 50 条
  • [31] Side-Channel Attacks: A Short Tour
    Piessens, Frank
    van Oorschot, Paul C.
    Piessens, Frank
    van Oorshot, Paul C.
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 75 - 80
  • [32] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [33] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
  • [34] On the Importance of Checking Multivariate Public Key Cryptography for Side-Channel Attacks: The Case of enTTS Scheme
    Yi, Haibo
    Li, Weijian
    COMPUTER JOURNAL, 2017, 60 (08): : 1197 - 1209
  • [35] Low-Cost Shuffling Countermeasures Against Side-Channel Attacks for NTT-Based Post-Quantum Cryptography
    Chen, Zhaohui
    Ma, Yuan
    Jing, Jiwu
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (01) : 322 - 326
  • [36] Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers
    Erata F.
    Xu C.
    Piskac R.
    Szefer J.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024, 2024 (02): : 735 - 768
  • [37] A Power Side-channel Attack Framework for Lattice-based Post Quantum Cryptography
    Hu W.
    Yuan C.
    Zheng J.
    Wang X.
    Li B.
    Tang S.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2023, 45 (09): : 3210 - 3217
  • [38] A gradient deconvolutional network for side-channel attacks
    Li, Yanbin
    Huang, Yuxin
    Jia, Fuwei
    Zhao, Qingsong
    Tang, Ming
    Ren, Shougang
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 98
  • [39] Remote Side-Channel Attacks on Anonymous Transactions
    Tramer, Florian
    Boneh, Dan
    Paterson, Kenneth G.
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2739 - 2756
  • [40] Side-Channel Attacks on Mobile and Wearable Systems
    Nahapetian, Ani
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,