<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
Mistrustful cryptography includes important tasks like bit commitment, oblivious transfer, coin flipping, secure computations, position authentication, digital signatures and secure unforgeable tokens. Practical quantum implementations presently use photonic setups. In many such implementations, Alice sends photon pulses encoding quantum states and Bob chooses measurements on these states. In practice, Bob generally uses single photon threshold detectors, which cannot distinguish the number of photons in detected pulses. Also, losses and other imperfections require Bob to report the detected pulses. Thus, malicious Alice can send and track multiphoton pulses and thereby gain information about Bob's measurement choices, violating the protocols' security. Here, we provide a theoretical framework for analysing such multiphoton attacks, and present known and new attacks. We illustrate the power of these attacks with an experiment, and study their application to earlier experimental demonstrations of mistrustful quantum cryptography. We analyse countermeasures based on selective reporting and prove them inadequate. We also discuss side-channel attacks where Alice controls further degrees of freedom or sends other physical systems.
Section VII and clarifications added. Accepted version
SECURITY, PROTOCOL, PROOF, Quantum Physics, 103025 Quantenmechanik, Physics, QC1-999, 102017 Cryptology, FOS: Physical sciences, DETECTOR CONTROL ATTACK, ROBUST COUNTERMEASURE, QA76.75-76.765, Quantum cryptography, SYSTEMS, BIT COMMITMENT, KEY DISTRIBUTION, 102017 Kryptologie, 103025 Quantum mechanics, Computer software, Quantum Physics (quant-ph), [PHYS.QPHY] Physics [physics]/Quantum Physics [quant-ph]
SECURITY, PROTOCOL, PROOF, Quantum Physics, 103025 Quantenmechanik, Physics, QC1-999, 102017 Cryptology, FOS: Physical sciences, DETECTOR CONTROL ATTACK, ROBUST COUNTERMEASURE, QA76.75-76.765, Quantum cryptography, SYSTEMS, BIT COMMITMENT, KEY DISTRIBUTION, 102017 Kryptologie, 103025 Quantum mechanics, Computer software, Quantum Physics (quant-ph), [PHYS.QPHY] Physics [physics]/Quantum Physics [quant-ph]
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 11 | |
popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |