Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures

Full metadata record
DC Field Value Language
dc.contributor.authorPark, D.-
dc.contributor.authorKim, G.-
dc.contributor.authorHeo, D.-
dc.contributor.authorKim, S.-
dc.contributor.authorKim, H.-
dc.contributor.authorHong, S.-
dc.date.accessioned2021-12-03T12:41:27Z-
dc.date.available2021-12-03T12:41:27Z-
dc.date.created2021-08-31-
dc.date.issued2021-03-
dc.identifier.issn2405-9595-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/129119-
dc.description.abstractAlthough quantum mechanics guarantees the security of the quantum key distribution system, it is crucial to examine whether the implementation flaws can lead to the disclosure of sensitive information. In this paper, we propose the side-channel attack on the key reconciliation in the quantum key distribution system. In this system, the sifted key and the syndrome are used to derive a shared secret key between two users. From our attack, these can be fully recovered through a single power consumption trace measured during the syndrome computation on the sender's side. Additionally, we propose efficient countermeasures to thwart such side-channel attacks. © 2021 The Korean Institute of Communications and Information Sciences (KICS)-
dc.languageEnglish-
dc.language.isoen-
dc.publisherKorean Institute of Communication Sciences-
dc.titleSingle trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, H.-
dc.contributor.affiliatedAuthorHong, S.-
dc.identifier.doi10.1016/j.icte.2021.01.013-
dc.identifier.scopusid2-s2.0-85101030326-
dc.identifier.wosid000631986200007-
dc.identifier.bibliographicCitationICT Express, v.7, no.1, pp.36 - 40-
dc.relation.isPartOfICT Express-
dc.citation.titleICT Express-
dc.citation.volume7-
dc.citation.number1-
dc.citation.startPage36-
dc.citation.endPage40-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.description.journalRegisteredClasskci-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorLow-density parity-check code-
dc.subject.keywordAuthorQuantum key distribution-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorSide-channel attack-
dc.subject.keywordAuthorSingle trace attack-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Cyber Security > 1. Journal Articles
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE