Quantum Hacking on the Technical Implementation of Continuous-Variable Quantum Key Distribution Systems

被引:0
|
作者
Nasedkin, B. A. [1 ]
Goncharov, R. K. [1 ,2 ]
Morozova, P. A. [1 ]
Filipov, I. M. [1 ]
Chistiakov, V. V. [1 ]
Samsonov, E. O. [1 ,2 ]
Egorov, V. I. [1 ,2 ]
机构
[1] ITMO Univ, St Petersburg, Russia
[2] Smarts Kvanttelekom OJSV, St Petersburg, Russia
关键词
REAL LOCAL OSCILLATORS; TROJAN-HORSE ATTACKS; PRACTICAL SECURITY; PULSE ATTACK; CRYPTOGRAPHY;
D O I
10.1007/s11141-025-10350-1
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We review attacks on the technical implementation of continuous-variable quantum key distribution systems, considering such attack types as the Trojan-horse attack, the induced-photorefraction attack, and the laser-damage attack. The attacks on the specific features of continuous-variable quantum key distribution systems are also considered.
引用
收藏
页码:23 / 37
页数:15
相关论文
共 50 条
  • [1] Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution
    Qin, Hao
    Kumar, Rupesh
    Alleaume, Romain
    PHYSICAL REVIEW A, 2016, 94 (01)
  • [2] Quantum hacking of continuous-variable quantum key distribution systems: realtime Trojan-horse attacks
    Stiller, B.
    Khan, I.
    Jain, N.
    Jouguet, P.
    Kunz-Jacques, S.
    Diamanti, E.
    Marquardt, Ch.
    Leuchs, G.
    2015 CONFERENCE ON LASERS AND ELECTRO-OPTICS (CLEO), 2015,
  • [3] Hacking Alice's box in continuous-variable quantum key distribution
    Pereira, Jason
    Pirandola, Stefano
    PHYSICAL REVIEW A, 2018, 98 (06)
  • [4] Practical implementation,of continuous-variable quantum key distribution
    Hirano, Takuya
    Shimoguchi, Atsushi
    Shirasaki, Kazuya
    Tokunaga, Shingo
    Furuki, Atsushi
    Kawamoto, Yohei
    namiki, Ryo
    QUANTUM INFORMATION AND COMPUTATION IV, 2006, 6244
  • [5] Quantum Hacking on an Integrated Continuous-Variable Quantum Key Distribution System via Power Analysis
    Zheng, Yi
    Shi, Haobin
    Pan, Wei
    Wang, Quantao
    Mao, Jiahui
    ENTROPY, 2021, 23 (02) : 1 - 11
  • [6] Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack
    Huang, Jing-Zheng
    Weedbrook, Christian
    Yin, Zhen-Qiang
    Wang, Shuang
    Li, Hong-Wei
    Chen, Wei
    Guo, Guang-Can
    Han, Zheng-Fu
    PHYSICAL REVIEW A, 2013, 87 (06):
  • [7] Continuous-variable quantum key distribution
    Grosshans, F.
    Acin, A.
    Cerf, N. J.
    QUANTUM INFORMATION WITH CONTINOUS VARIABLES OF ATOMS AND LIGHT, 2007, : 63 - +
  • [8] Implementation of continuous-variable quantum key distribution with discrete modulation
    Hirano, Takuya
    Ichikawa, Tsubasa
    Matsubara, Takuto
    Ono, Motoharu
    Oguri, Yusuke
    Namiki, Ryo
    Kasai, Kenta
    Matsumoto, Ryutaroh
    Tsurumaru, Toyohiro
    QUANTUM SCIENCE AND TECHNOLOGY, 2017, 2 (02):
  • [9] Machine-learning-based detection for quantum hacking attacks on continuous-variable quantum-key-distribution systems
    Ding, Chao
    Wang, Shi
    Wang, Yaonan
    Wu, Zijie
    Sun, Jingtao
    Mao, Yiyu
    PHYSICAL REVIEW A, 2023, 107 (06)
  • [10] Unidimensional continuous-variable quantum key distribution
    Usenko, Vladyslav C.
    Grosshans, Frederic
    PHYSICAL REVIEW A, 2015, 92 (06):