会议论文详细信息
4th International Conference on Mathematical Modeling in Physical Sciences
Post-quantum attacks on key distribution schemes in the presence of weakly stochastic sources
物理学;数学
Al-Safi, S.W.^1 ; Wilmott, C.M.^1
Department of Physics and Mathematics, Nottingham Trent University, Clifton Campus, Nottingham
NG11 8NS, United Kingdom^1
关键词: Experimental conditions;    Key distribution schemes;    Post quantum;    Provably secure;    Quantum key distribution protocols;    Random sources;    Real-world;    Weak randomness;   
Others  :  https://iopscience.iop.org/article/10.1088/1742-6596/633/1/012029/pdf
DOI  :  10.1088/1742-6596/633/1/012029
来源: IOP
PDF
【 摘 要 】

It has been established that the security of quantum key distribution protocols can be severely compromised were one to permit an eavesdropper to possess a very limited knowledge of the random sources used between the communicating parties. While such knowledge should always be expected in realistic experimental conditions, the result itself opened a new line of research to fully account for real-world weak randomness threats to quantum cryptography. Here we expand of this novel idea by describing a key distribution scheme that is provably secure against general attacks by a post-quantum adversary. We then discuss possible security consequences for such schemes under the assumption of weak randomness.

【 预 览 】
附件列表
Files Size Format View
Post-quantum attacks on key distribution schemes in the presence of weakly stochastic sources 729KB PDF download
  文献评价指标  
  下载次数:4次 浏览次数:23次