On the Security of Offloading Post-Processing for Quantum Key Distribution

10/17/2022
by   Thomas Loruenser, et al.
0

Quantum key distribution (QKD) has been researched for almost four decades and is currently making its way to commercial applications. However, deployment of the technology at scale is challenging, because of the very particular nature of QKD and its physical limitations. Among others, QKD is computationally intensive in the post-processing phase and devices are therefore complex and power hungry, which leads to problems in certain application scenarios. In this work we study the possibility to offload computationally intensive parts in the QKD post-processing stack in a secure way to untrusted hardware. We show how error correction can be securely offloaded for discrete-variable QKD to a single untrusted server and that the same method cannot be used for long distance continuous-variable QKD. Furthermore, we analyze possibilities for multi-server protocols to be used for error correction and privacy amplification. Even in cases where it is not possible to offload to an external server, being able to delegate computation to untrusted hardware components on the device could improve the cost and certification effort for device manufacturers.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/14/2018

Leftover hashing from quantum error correction: Unifying the two approaches to the security proof of quantum key distribution

Privacy amplification (PA) is an important building block in cryptograph...
research
11/30/2022

Real time QKD Post Processing based on Reconfigurable Hardware Acceleration

Key Distillation is an essential component of every Quantum Key Distribu...
research
02/15/2023

Quantum key distribution with post-processing driven by physical unclonable functions

Quantum key-distribution protocols allow two honest distant parties to e...
research
02/03/2022

The Wiretap Channel for Capacitive PUF-Based Security Enclosures

In order to protect devices from physical manipulations, protective secu...
research
09/29/2021

Device-Independent Quantum Key Distribution

Cryptographic key exchange protocols traditionally rely on computational...
research
09/18/2020

Equivalence of three quantum algorithms: Privacy amplification, error correction, and data compression

Privacy amplification (PA) is an indispensable component in classical an...
research
07/22/2022

Secure and Lightweight Strong PUF Challenge Obfuscation with Keyed Non-linear FSR

We propose a secure and lightweight key based challenge obfuscation for ...

Please sign up or login with your details

Forgot password? Click here to reset