68,960 research outputs found
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
Security Analysis of an Untrusted Source for Quantum Key Distribution: Passive Approach
We present a passive approach to the security analysis of quantum key
distribution (QKD) with an untrusted source. A complete proof of its
unconditional security is also presented. This scheme has significant
advantages in real-life implementations as it does not require fast optical
switching or a quantum random number generator. The essential idea is to use a
beam splitter to split each input pulse. We show that we can characterize the
source using a cross-estimate technique without active routing of each pulse.
We have derived analytical expressions for the passive estimation scheme.
Moreover, using simulations, we have considered four real-life imperfections:
Additional loss introduced by the "plug & play" structure, inefficiency of the
intensity monitor, noise of the intensity monitor, and statistical fluctuation
introduced by finite data size. Our simulation results show that the passive
estimate of an untrusted source remains useful in practice, despite these four
imperfections. Also, we have performed preliminary experiments, confirming the
utility of our proposal in real-life applications. Our proposal makes it
possible to implement the "plug & play" QKD with the security guaranteed, while
keeping the implementation practical.Comment: 35 pages, 19 figures. Published Versio
Unconditional security at a low cost
By simulating four quantum key distribution (QKD) experiments and analyzing
one decoy-state QKD experiment, we compare two data post-processing schemes
based on security against individual attack by L\"{u}tkenhaus, and
unconditional security analysis by Gottesman-Lo-L\"{u}tkenhaus-Preskill. Our
results show that these two schemes yield close performances. Since the Holy
Grail of QKD is its unconditional security, we conclude that one is better off
considering unconditional security, rather than restricting to individual
attacks.Comment: Accepted by International Conference on Quantum Foundation and
Technology: Frontier and Future 2006 (ICQFT'06
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL
Split manufacturing was introduced as an effective countermeasure against
hardware-level threats such as IP piracy, overbuilding, and insertion of
hardware Trojans. Nevertheless, the security promise of split manufacturing has
been challenged by various attacks, which exploit the well-known working
principles of physical design tools to infer the missing BEOL interconnects. In
this work, we advocate a new paradigm to enhance the security for split
manufacturing. Based on Kerckhoff's principle, we protect the FEOL layout in a
formal and secure manner, by embedding keys. These keys are purposefully
implemented and routed through the BEOL in such a way that they become
indecipherable to the state-of-the-art FEOL-centric attacks. We provide our
secure physical design flow to the community. We also define the security of
split manufacturing formally and provide the associated proofs. At the same
time, our technique is competitive with current schemes in terms of layout
overhead, especially for practical, large-scale designs (ITC'99 benchmarks).Comment: DATE 2019 (https://www.date-conference.com/conference/session/4.5
- …