4th International Conference on Mathematical Modeling in Physical Sciences | |
Post-quantum attacks on key distribution schemes in the presence of weakly stochastic sources | |
物理学;数学 | |
Al-Safi, S.W.^1 ; Wilmott, C.M.^1 | |
Department of Physics and Mathematics, Nottingham Trent University, Clifton Campus, Nottingham | |
NG11 8NS, United Kingdom^1 | |
关键词: Experimental conditions; Key distribution schemes; Post quantum; Provably secure; Quantum key distribution protocols; Random sources; Real-world; Weak randomness; | |
Others : https://iopscience.iop.org/article/10.1088/1742-6596/633/1/012029/pdf DOI : 10.1088/1742-6596/633/1/012029 |
|
来源: IOP | |
【 摘 要 】
It has been established that the security of quantum key distribution protocols can be severely compromised were one to permit an eavesdropper to possess a very limited knowledge of the random sources used between the communicating parties. While such knowledge should always be expected in realistic experimental conditions, the result itself opened a new line of research to fully account for real-world weak randomness threats to quantum cryptography. Here we expand of this novel idea by describing a key distribution scheme that is provably secure against general attacks by a post-quantum adversary. We then discuss possible security consequences for such schemes under the assumption of weak randomness.
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
Post-quantum attacks on key distribution schemes in the presence of weakly stochastic sources | 729KB | download |