Notice, by using this platform, you agree to the Terms of Use and Privacy Policy.
Privacy amplification
Privacy Amplification is a countermeasure employed in Quantum Key Distribution (QKD) systems to transform a potentially partially compromised key into a highly secure one, using hash functions to remove any patterns exploitable by eavesdroppers.
References
[1] Thomas Vidick, Lecture Notes - Quantum Cryptography Week 4: From imperfect information to (near) perfect security, http://users.cms.caltech.edu/~vidick/teaching/120_qcrypto/LN_Week4.pdfLiterature
[Bennet1992] | C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smolin. "Experimental quantum cryptography" In: J. Cryptology 5, 3–28. (1992) 10.1007/BF00191318. |
Technique → Countermeasures
List of techniques where this countermeasure can be applied.
Items: 3
Description | Technique |
---|---|
Application of privacy amplification in the case of partial key leakage. |
Quantum Trojan-Horse Attack (THA) |
Privacy amplification can secure the key distribution process even in the presence of some level of eavesdropping. |
Photon-Number-Splitting (PNS) Attack |
Privacy amplification can secure the key distribution process even in the presence of some level of eavesdropping. |
Intercept-and-Resend Attack |