Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack

被引:174
|
作者
Huang, Jing-Zheng [1 ]
Weedbrook, Christian [2 ,3 ]
Yin, Zhen-Qiang [1 ]
Wang, Shuang [1 ]
Li, Hong-Wei [1 ]
Chen, Wei [1 ]
Guo, Guang-Can [1 ]
Han, Zheng-Fu [1 ]
机构
[1] Univ Sci & Technol China, Key Lab Quantum Informat, Hefei 230026, Peoples R China
[2] Univ Toronto, Ctr Quantum Informat & Quantum Control, Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
[3] Univ Toronto, Dept Phys, Toronto, ON M5S 3G4, Canada
来源
PHYSICAL REVIEW A | 2013年 / 87卷 / 06期
基金
中国国家自然科学基金; 加拿大自然科学与工程研究理事会;
关键词
CRYPTOGRAPHY;
D O I
10.1103/PhysRevA.87.062329
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which allows the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final keys shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be randomly added before performing monitoring detection.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol
    Ma, Xiang-Chun
    Sun, Shi-Hai
    Jiang, Mu-Sheng
    Liang, Lin-Mei
    [J]. PHYSICAL REVIEW A, 2013, 87 (05):
  • [2] Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution
    Qin, Hao
    Kumar, Rupesh
    Alleaume, Romain
    [J]. PHYSICAL REVIEW A, 2016, 94 (01)
  • [3] Wavelength attack on atmospheric continuous-variable quantum key distribution
    Tan, Xin
    Guo, Ying
    Zhang, Ling
    Huang, Jingzheng
    Shi, Jinjing
    Huang, Duan
    [J]. PHYSICAL REVIEW A, 2021, 103 (01)
  • [4] Machine-learning-based detection for quantum hacking attacks on continuous-variable quantum-key-distribution systems
    Ding, Chao
    Wang, Shi
    Wang, Yaonan
    Wu, Zijie
    Sun, Jingtao
    Mao, Yiyu
    [J]. PHYSICAL REVIEW A, 2023, 107 (06)
  • [5] Polarization attack on continuous-variable quantum key distribution system
    Zhao, Yijia
    Zhang, Yichen
    Huang, Yundi
    Yu, Song
    Guo, Hong
    [J]. QUANTUM INFORMATION SCIENCE AND TECHNOLOGY IV, 2018, 10803
  • [6] Saturation Attack On Continuous-Variable Quantum Key Distribution System
    Qin, Hao
    Kumar, Rupesh
    Alleaume, Romain
    [J]. EMERGING TECHNOLOGIES IN SECURITY AND DEFENCE; AND QUANTUM SECURITY II; AND UNMANNED SENSOR SYSTEMS X, 2013, 8899
  • [7] Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack
    Ma, Hong-Xin
    Bao, Wan-Su
    Li, Hong-Wei
    Chou, Chun
    [J]. CHINESE PHYSICS B, 2016, 25 (08)
  • [8] Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack
    马鸿鑫
    鲍皖苏
    李宏伟
    周淳
    [J]. Chinese Physics B, 2016, 25 (08) : 69 - 74
  • [9] Underwater Wavelength Attack on Discrete Modulated Continuous-Variable Quantum Key Distribution
    Feng, Kangyi
    Wang, Yijun
    Li, Yin
    Wang, Yuang
    Zuo, Zhiyue
    Guo, Ying
    [J]. ENTROPY, 2024, 26 (06)
  • [10] Quantum Hacking on an Integrated Continuous-Variable Quantum Key Distribution System via Power Analysis
    Zheng, Yi
    Shi, Haobin
    Pan, Wei
    Wang, Quantao
    Mao, Jiahui
    [J]. ENTROPY, 2021, 23 (02) : 1 - 11