共查询到20条相似文献,搜索用时 15 毫秒
1.
In practical quantum key distribution (QKD) systems, a single photon-detector (SPD) is one of the most vulnerable components. Faint after-gate attack is a universal attack against the detector. However, the original faint after-gate attack can be discovered by monitoring the photocurrent. This paper presents a probabilistic generalization of the attack, which we refer to as probabilistic faint after-gate attack, by introducing probability control modules. Previous countermeasures for photocurrent monitoring may fail in detecting the eavesdropper under some specific probabilities. To mitigate this threat, we provide a method to determine the detectable boundary in the limitation of precision of photocurrent monitoring, and investigate the security of QKD systems under such boundaries using the weak randomness model. 相似文献
2.
Security of a practical semi-device-independent quantum key distribution protocol against collective attacks 下载免费PDF全文
Similar to device-independent quantum key distribution(DI-QKD), semi-device-independent quantum key distribution(SDI-QKD) provides secure key distribution without any assumptions about the internal workings of the QKD devices.The only assumption is that the dimension of the Hilbert space is bounded. But SDI-QKD can be implemented in a oneway prepare-and-measure configuration without entanglement compared with DI-QKD. We propose a practical SDI-QKD protocol with four preparation states and three measurement bases by considering the maximal violation of dimension witnesses and specific processes of a QKD protocol. Moreover, we prove the security of the SDI-QKD protocol against collective attacks based on the min-entropy and dimension witnesses. We also show a comparison of the secret key rate between the SDI-QKD protocol and the standard QKD. 相似文献
3.
H. Inamori N. Lütkenhaus D. Mayers 《The European Physical Journal D - Atomic, Molecular, Optical and Plasma Physics》2007,41(3):599-627
We present a complete protocol for BB84 quantum key distribution for a realistic setting (noise, loss, multi-photon signals
of the source) that covers many of todays experimental implementations. The security of this protocol is shown against an
eavesdropper having unrestricted power to manipulate the signals coherently on their path from sender to receiver. The protocol
and the security proof take into account the effects concerning the finite size of the generated key. This paper is identical
to the preprint arXiv:quant-ph/0107017, which was finalized in 2001. Therefore, some of the more recent developments, including the question of composability, are
not addressed. 相似文献
4.
Trusted relays are the main state-of-the-art way to realize quantum key distribution networks.However, it is hard to require that all nodes in the network are fully trusted. In a multipath keytransmission mechanism, the nodes can be weakly trusted because the secret key can be split into many parts and each part is transmitted to the receiver through a different path. However, if the capacity of a node's quantum key pool is poorly designed, an attacker, Eve may eavesdrop on the communicating parties' secret message by initiating a redirection attack. In this paper, we show that Eve can trigger a cascading collapse effect by collapsing one of the edges in the network and forcing the communication parties to transmit the message through the nodes controlled by Eve. The influence of the traffic transfer ratio and the control parameters of the edge load on the breakdown probability of the edge are analyzed using a simulation. In order to effectively defend against the cascading attack, it is important for the designer to handle the relationship between the traffic and the capacity of the quantum key pool of each node in the network. 相似文献
5.
Security of quantum key distribution using two-mode squeezed states against optimal beam splitter attack 下载免费PDF全文
For the beam splitter attack strategy against quantum key distribution using two-mode squeezed states, the analytical expression of the optimal beam splitter parameter is provided in this paper by applying the Shannon information theory. The theoretical secret information rate after error correction and privacy amplification is given in terms of the squeezed parameter and channel parameters. The results show that the two-mode squeezed state quantum key distribution is secure against an optimal beam splitter attack. 相似文献
6.
7.
Yuan Li Peng Huang Shiyu Wang Tao Wang Dengwen Li Guihua Zeng 《Physics letters. A》2018,382(45):3253-3261
In a fiber-based continuous-variable quantum key distribution (CVQKD) system, to perform the channel estimation, the channel transmittance is usually assumed to be a constant. Subsequently, when the channel parameters are intentionally manipulated, the employed parameter estimation method will lead to deviations of channel parameters and ultimately impacting the evaluation of the secret key rate. In this paper, we propose a denial-of-service attack strategy based on Eve's manipulation of the channel parameters. In particular, we analyze in detail the impact of this attack when the channel transmittance is attacked and obeys two-point distribution and uniform distribution. The result shows that in both cases, Eve's slight manipulation on the quantum channel will lead to large underestimation of the secure transmission distance by using the previous parameter estimation, which will lead to intentional terminations of the communication. To prevent this attack, a simple data post-selection should be added before parameter estimation. 相似文献
8.
Nitin Jain Birgit Stiller Imran Khan Dominique Elser Christoph Marquardt Gerd Leuchs 《Contemporary Physics》2016,57(3):366-387
With the emergence of an information society, the idea of protecting sensitive data is steadily gaining importance. Conventional encryption methods may not be sufficient to guarantee data protection in the future. Quantum key distribution (QKD) is an emerging technology that exploits fundamental physical properties to guarantee perfect security in theory. However, it is not easy to ensure in practice that the implementations of QKD systems are exactly in line with the theoretical specifications. Such theory–practice deviations can open loopholes and compromise security. Several such loopholes have been discovered and investigated in the last decade. These activities have motivated the proposal and implementation of appropriate countermeasures, thereby preventing future attacks and enhancing the practical security of QKD. This article introduces the so-called field of quantum hacking by summarising a variety of attacks and their prevention mechanisms. 相似文献
9.
Influence of multi-photon pulses on practical differential-phase-shift quantum key distribution 下载免费PDF全文
The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) attack and BS (beam splitting) attack. The result indicates that the PNS attack and BS attack will not limit the transmission distance as long as we select an appropriate mean photon number. Also, the maximum mean photon number under BS attack in practical DPS-QKD system and the set of practical assumptions about Eve's capabilities are presented.[第一段] 相似文献
10.
Intercept-resend attack on six-state quantum key distribution over collective-rotation noise channels 下载免费PDF全文
We investigate the effect of collective-rotation noise on the security of the six-state quantum key distribution. We study the case where the eavesdropper, Eve, performs an intercept-resend attack on the quantum communication between Alice, the sender, and Bob, the receiver. We first derive the collective-rotation noise model for the six-state protocol and then parameterize the mutual information between Alice and Eve. We then derive quantum bit error rate for three interceptresend attack scenarios. We observe that the six-state protocol is robust against intercept-resend attacks on collective rotation noise channels when the rotation angle is kept within certain bounds. 相似文献
11.
Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack 下载免费PDF全文
We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. 相似文献
12.
We consider two quantum cryptographic schemes relying on encoding the key into qudits, i.e., quantum states in a d-dimensional Hilbert space. The first cryptosystem uses two mutually unbiased bases (thereby extending the BB84 scheme), while the second exploits all d+1 available such bases (extending the six-state protocol for qubits). We derive the information gained by a potential eavesdropper applying a cloning-based individual attack, along with an upper bound on the error rate that ensures unconditional security against coherent attacks. 相似文献
13.
The most severe problem of a two-way "plug-and-play" (p & p) quantum key distribution system is that the source can be controlled by the eavesdropper. This kind of source is defined as an üntrusted source". This paper discusses the effects of the fluctuation of internal transmittance on the final key generation rate and the transmission distance. The security of the standard BB84 protocol, one-decoy state protocol, and weak+vacuum decoy state protocol, with untrusted sources and the fluctuation of internal transmittance are studied. It is shown that the one-decoy state is sensitive to the statistical fluctuation but weak+vacuum decoy state is only slightly affected by the fluctuation. It is also shown that both the maximum secure transmission distance and final key generation rate are reduced when Alice's laboratory transmittance fluctuation is considered. 相似文献
14.
Wang XB 《Physical review letters》2005,94(23):230503
We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of Eve's action. The protocol simply uses two coherent states for the signal pulses and vacuum for the decoy pulse. Our verified upper bound is sufficiently tight for quantum key distribution with a very lossy channel, in both the asymptotic and nonasymptotic case. So far our protocol is the only decoy-state protocol that works efficiently for currently existing setups. 相似文献
15.
Finite-key analysis of practical time-bin high-dimensional quantum key distribution with afterpulse effect 下载免费PDF全文
High-dimensional quantum resources provide the ability to encode several bits of information on a single photon, which can particularly increase the secret key rate rate of quantum key distribution (QKD) systems. Recently, a practical four-dimensional QKD scheme based on time-bin quantum photonic state, only with two single-photon avalanche detectors as measurement setup, has been proven to have a superior performance than the qubit-based one. In this paper, we extend the results to our proposed eight-dimensional scheme. Then, we consider two main practical factors to improve its secret key bound. Concretely, we take the afterpulse effect into account and apply a finite-key analysis with the intensity fluctuations. Our secret bounds give consideration to both the intensity fluctuations and the afterpulse effect for the high-dimensional QKD systems. Numerical simulations show the bound of eight-dimensional QKD scheme is more robust to the intensity fluctuations but more sensitive to the afterpulse effect than the four-dimensional one. 相似文献
16.
S. N. Molotkov 《Journal of Experimental and Theoretical Physics》2008,107(1):28-48
In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper’s capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determined for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency (η ≈ 20%) and dark count probability (p dark ~ 10?7). 相似文献
17.
18.
D. A. Kronberg S. N. Molotkov 《Bulletin of the Russian Academy of Sciences: Physics》2010,74(7):912-918
A quantum scheme for an optimal attack on protocol BB84, the most studied protocol of quantum cryptography, is constructed.
The physical implementation of this scheme on the basis of linear fiber-optical elements and the two-particle “controlled
NOT” quantum transformation is proposed. 相似文献
19.
Differential-phase-shift (DPS) quantum key distribution (QKD) is one of the QKD protocols, featuring simplicity for practical implementation. It uses a coherent pulse train whose phase should be stable at least within the pulse interval. This paper quantitatively investigates the phase stability required for DPS-QKD systems. The phase stability is characterized by the spectral linewidth of the light source. A theoretical model and experiments are presented, the results of which indicate that the linewidth should be, for example, less than 0.35% of the free-spectral-range of an asymmetric Mach-Zehnder interferometer in a receiver to achieve quantum bit error rate of less than 0.5% due to linewidth broadening of the light source. 相似文献
20.
Measurement-device-independent quantum key distribution 总被引:1,自引:0,他引:1
How to remove detector side channel attacks has been a notoriously hard problem in quantum cryptography. Here, we propose a simple solution to this problem--measurement-device-independent quantum key distribution (QKD). It not only removes all detector side channels, but also doubles the secure distance with conventional lasers. Our proposal can be implemented with standard optical components with low detection efficiency and highly lossy channels. In contrast to the previous solution of full device independent QKD, the realization of our idea does not require detectors of near unity detection efficiency in combination with a qubit amplifier (based on teleportation) or a quantum nondemolition measurement of the number of photons in a pulse. Furthermore, its key generation rate is many orders of magnitude higher than that based on full device independent QKD. The results show that long-distance quantum cryptography over say 200 km will remain secure even with seriously flawed detectors. 相似文献