Translator Disclaimer
Presentation + Paper
8 October 2018 Quantum cryptography with malicious devices
Marcos Curty, Hoi-Kwong Lo
Author Affiliations +
The current paradigm for the security of quantum key distribution (QKD) relies on the legitimate users of the system trusting their devices, which include both the quantum communication components and the classical post-processing units. However, in view of the memory attacks recently proposed against device-independent QKD, as well as the many hardware and software Trojan Horse attacks that threaten the security of conventional cryptography today, such trust is a very strong and unjustified assumption. Here we review a recent proposal to solve this problem based on the use of verifiable secret sharing and redundancies. We show that this approach can deliver secret key rates which are comparable to those obtained in an ideal scenario with honest devices.
Conference Presentation
© (2018) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Marcos Curty and Hoi-Kwong Lo "Quantum cryptography with malicious devices", Proc. SPIE 10803, Quantum Information Science and Technology IV, 1080303 (8 October 2018);


Calculation of key reduction for B92 QKD protocol
Proceedings of SPIE (May 21 2015)
Noise-resistant quantum key distribution protocol
Proceedings of SPIE (May 28 2004)
Quantum three-pass cryptography protocol
Proceedings of SPIE (September 13 2002)
Introduction to optical quantum cryptography
Proceedings of SPIE (December 28 2007)

Back to Top