首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices
Authors:Lin-Mei Liang  Shi-Hai Sun  Mu-Sheng Jiang  Chun-Yan Li
Institution:1. Department of Physics, National University of Defense Technology, Changsha, 410073, China
2. State Key Laboratory of High Performance Computing, National University of Defense Technology, Changsha, 410073, China
Abstract:In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].
Keywords:quantum key distribution  quantum cryptography  quantum hacking
本文献已被 维普 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号