TY - GEN
T1 - Attacks on fixed apparatus quantum key distribution schemes
AU - Boyer, Michel
AU - Gelles, Ran
AU - Mor, Tal
PY - 2012
Y1 - 2012
N2 - We consider quantum key distribution implementations in which the receiver's apparatus is fixed and does not depend on a choice of basis at each qubit transmission. We show that, although theoretical quantum key distribution (QKD) is proven secure, such implementations are totally insecure against a strong eavesdropper that has a one-time (single) access to the receiver's equipment. The attack we present here, the "fixed-apparatus attack" causes a potential risk to the usefulness of several recent QKD implementations.
AB - We consider quantum key distribution implementations in which the receiver's apparatus is fixed and does not depend on a choice of basis at each qubit transmission. We show that, although theoretical quantum key distribution (QKD) is proven secure, such implementations are totally insecure against a strong eavesdropper that has a one-time (single) access to the receiver's equipment. The attack we present here, the "fixed-apparatus attack" causes a potential risk to the usefulness of several recent QKD implementations.
KW - Implementation loopholes
KW - Quantum Cryptography
KW - Quantum Key Distribution
KW - Security
UR - https://www.scopus.com/pages/publications/84868247034
U2 - 10.1007/978-3-642-33860-1_9
DO - 10.1007/978-3-642-33860-1_9
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:84868247034
SN - 9783642338595
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 97
EP - 107
BT - Theory and Practice of Natural Computing - First International Conference, TPNC 2012, Proceedings
T2 - 1st International Conference on the Theory and Practice of Natural Computing, TPNC 2012
Y2 - 2 October 2010 through 4 October 2010
ER -