Quantum key distribution with post-processing driven by physical unclonable functions

02/15/2023
by   Georgios M. Nikolopoulos, et al.
0

Quantum key-distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries, provided that the two users share beforehand a short secret key. This pre-shared secret key is used mainly for authentication purposes in the post-processing of classical data that have been obtained during the quantum communication stage, and it prevents a man-in-the-middle attack. The necessity of a pre-shared key is usually considered as the main drawback of quantum key-distribution protocols, which becomes even stronger for large networks involving more that two users. Here we discuss the conditions under which physical unclonable function can be integrated in currently available quantum key-distribution systems, in order to facilitate the generation and the distribution of the necessary pre-shared key, with the smallest possible cost in the security of the systems. Moreover, the integration of physical unclonable functions in quantum key-distribution networks allows for real-time authentication of the devices that are connected to the network.

READ FULL TEXT
research
06/02/2022

Authentication of quantum key distribution with post-quantum cryptography and replay attacks

With the development of quantum computers, traditional cryptographic sys...
research
03/25/2019

Lightweight authentication for quantum key distribution

Quantum key distribution (QKD) enables unconditionally secure communicat...
research
06/01/2020

The QQUIC Transport Protocol: Quantum assisted UDP Internet Connections

Quantum key distribution, initialized in 1984, is a commercialized secur...
research
05/11/2021

Noise-Tolerant Quantum Tokens for MAC

Message Authentication Code or MAC, is a well-studied cryptographic prim...
research
10/17/2022

On the Security of Offloading Post-Processing for Quantum Key Distribution

Quantum key distribution (QKD) has been researched for almost four decad...
research
03/23/2020

Backflash Light as a Security Vulnerability in Quantum Key Distribution Systems

Based on the fundamental rules of quantum mechanics, two communicating p...
research
04/09/2021

Secret Key Distribution Protocols Based on Self-Powered Timekeeping Devices

In this paper, we present novel secret key distribution protocols using ...

Please sign up or login with your details

Forgot password? Click here to reset