Articles producció científica> Enginyeria Informàtica i Matemàtiques

Software-based remote memory attestation using quantum entanglement

  • Identification data

    Identifier: imarina:9369727
    Authors:
    Laeuchli JTrujillo-Rasua R
    Abstract:
    Software-based remote memory attestation is a method for determining the state of a remote device without relying on secure hardware. In classical computing devices, the method is vulnerable to proxy and authentication attacks, because an infected device has no means of preventing the leak of its cryptographic secrets. In this paper, we demonstrate how these attacks can be mitigated by making use of quantum effects, while remaining within the class of software-based methods. In particular, we make use of entanglement and the inability of an attacker to clone qubits. Our proposed protocol is lightweight and can be implemented by near-term Quantum Computing techniques. The resulting protocol has the unique feature of resisting collusion between two dishonest devices, one of which has unbounded computational resources.
  • Others:

    Author, as appears in the article.: Laeuchli J; Trujillo-Rasua R
    Department: Enginyeria Informàtica i Matemàtiques
    URV's Author/s: Trujillo Rasua, Rolando
    Keywords: Distance bounding Distant attacker Entanglement Memory attestation
    Abstract: Software-based remote memory attestation is a method for determining the state of a remote device without relying on secure hardware. In classical computing devices, the method is vulnerable to proxy and authentication attacks, because an infected device has no means of preventing the leak of its cryptographic secrets. In this paper, we demonstrate how these attacks can be mitigated by making use of quantum effects, while remaining within the class of software-based methods. In particular, we make use of entanglement and the inability of an attacker to clone qubits. Our proposed protocol is lightweight and can be implemented by near-term Quantum Computing techniques. The resulting protocol has the unique feature of resisting collusion between two dishonest devices, one of which has unbounded computational resources.
    Thematic Areas: Astronomia / física Electrical and electronic engineering Electronic, optical and magnetic materials Engenharias iv Ensino Interdisciplinar Matemática / probabilidade e estatística Materiais Modeling and simulation Physics, mathematical Physics, multidisciplinary Quantum science & technology Química Signal processing Statistical and nonlinear physics Theoretical computer science
    licence for use: https://creativecommons.org/licenses/by/3.0/es/
    Author's mail: rolando.trujillo@urv.cat
    Author identifier: 0000-0002-8714-4626
    Record's date: 2024-10-12
    Papper version: info:eu-repo/semantics/publishedVersion
    Papper original source: Quantum Information Processing. 23 (6):
    APA: Laeuchli J; Trujillo-Rasua R (2024). Software-based remote memory attestation using quantum entanglement. Quantum Information Processing, 23(6), -. DOI: 10.1007/s11128-024-04421-x
    Licence document URL: https://repositori.urv.cat/ca/proteccio-de-dades/
    Entity: Universitat Rovira i Virgili
    Journal publication year: 2024
    Publication Type: Journal Publications
  • Keywords:

    Electrical and Electronic Engineering,Electronic, Optical and Magnetic Materials,Modeling and Simulation,Physics, Mathematical,Physics, Multidisciplinary,Quantum Science & Technology,Signal Processing,Statistical and Nonlinear Physics,Theoretical Computer Science
    Distance bounding
    Distant attacker
    Entanglement
    Memory attestation
    Astronomia / física
    Electrical and electronic engineering
    Electronic, optical and magnetic materials
    Engenharias iv
    Ensino
    Interdisciplinar
    Matemática / probabilidade e estatística
    Materiais
    Modeling and simulation
    Physics, mathematical
    Physics, multidisciplinary
    Quantum science & technology
    Química
    Signal processing
    Statistical and nonlinear physics
    Theoretical computer science
  • Documents:

  • Cerca a google

    Search to google scholar