Implementation vulnerabilities in general quantum cryptography

Anqi Huang, Stefanie Barz, Erika Andersson, Vadim Makarov

Research output: Contribution to journalArticle

Abstract

Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security of a quantum cryptographic system. This has been shown to happen for quantum key distribution (QKD). Here we apply experience from implementation security of QKD to several other quantum cryptographic primitives. We survey quantum digital signatures, quantum secret sharing, source-independent quantum random number generation, quantum secure direct communication, and blind quantum computing. We propose how the eavesdropper could in principle exploit the loopholes to violate assumptions in these protocols, breaking their security properties. Applicable countermeasures are also discussed. It is important to consider potential implementation security issues early in protocol design, to shorten the path to future applications.
Original languageEnglish
Article number103016
JournalNew Journal of Physics
Volume20
DOIs
Publication statusPublished - 10 Oct 2018

Fingerprint

quantum cryptography
vulnerability
random numbers
countermeasures
quantum computation
quantum mechanics
communication
signatures
defects

Keywords

  • quant-ph

Cite this

Huang, Anqi ; Barz, Stefanie ; Andersson, Erika ; Makarov, Vadim. / Implementation vulnerabilities in general quantum cryptography. In: New Journal of Physics. 2018 ; Vol. 20.
@article{fc19c9caeeb544d288a5d5e4fe6e7ecc,
title = "Implementation vulnerabilities in general quantum cryptography",
abstract = "Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security of a quantum cryptographic system. This has been shown to happen for quantum key distribution (QKD). Here we apply experience from implementation security of QKD to several other quantum cryptographic primitives. We survey quantum digital signatures, quantum secret sharing, source-independent quantum random number generation, quantum secure direct communication, and blind quantum computing. We propose how the eavesdropper could in principle exploit the loopholes to violate assumptions in these protocols, breaking their security properties. Applicable countermeasures are also discussed. It is important to consider potential implementation security issues early in protocol design, to shorten the path to future applications.",
keywords = "quant-ph",
author = "Anqi Huang and Stefanie Barz and Erika Andersson and Vadim Makarov",
year = "2018",
month = "10",
day = "10",
doi = "10.1088/1367-2630/aade06",
language = "English",
volume = "20",
journal = "New Journal of Physics",
issn = "1367-2630",
publisher = "IOP Publishing",

}

Implementation vulnerabilities in general quantum cryptography. / Huang, Anqi; Barz, Stefanie; Andersson, Erika; Makarov, Vadim.

In: New Journal of Physics, Vol. 20, 103016, 10.10.2018.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Implementation vulnerabilities in general quantum cryptography

AU - Huang, Anqi

AU - Barz, Stefanie

AU - Andersson, Erika

AU - Makarov, Vadim

PY - 2018/10/10

Y1 - 2018/10/10

N2 - Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security of a quantum cryptographic system. This has been shown to happen for quantum key distribution (QKD). Here we apply experience from implementation security of QKD to several other quantum cryptographic primitives. We survey quantum digital signatures, quantum secret sharing, source-independent quantum random number generation, quantum secure direct communication, and blind quantum computing. We propose how the eavesdropper could in principle exploit the loopholes to violate assumptions in these protocols, breaking their security properties. Applicable countermeasures are also discussed. It is important to consider potential implementation security issues early in protocol design, to shorten the path to future applications.

AB - Quantum cryptography is information-theoretically secure owing to its solid basis in quantum mechanics. However, generally, initial implementations with practical imperfections might open loopholes, allowing an eavesdropper to compromise the security of a quantum cryptographic system. This has been shown to happen for quantum key distribution (QKD). Here we apply experience from implementation security of QKD to several other quantum cryptographic primitives. We survey quantum digital signatures, quantum secret sharing, source-independent quantum random number generation, quantum secure direct communication, and blind quantum computing. We propose how the eavesdropper could in principle exploit the loopholes to violate assumptions in these protocols, breaking their security properties. Applicable countermeasures are also discussed. It is important to consider potential implementation security issues early in protocol design, to shorten the path to future applications.

KW - quant-ph

U2 - 10.1088/1367-2630/aade06

DO - 10.1088/1367-2630/aade06

M3 - Article

VL - 20

JO - New Journal of Physics

JF - New Journal of Physics

SN - 1367-2630

M1 - 103016

ER -