Hacking Alice's box in continuous-variable quantum key distribution

被引:15
|
作者
Pereira, Jason [1 ,2 ]
Pirandola, Stefano [1 ,2 ]
机构
[1] Univ York, Comp Sci, York YO10 5GH, N Yorkshire, England
[2] Univ York, York Ctr Quantum Technol, York YO10 5GH, N Yorkshire, England
基金
英国工程与自然科学研究理事会;
关键词
CRYPTOGRAPHY; SECURITY;
D O I
10.1103/PhysRevA.98.062319
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Security analyses of quantum cryptographic protocols typically rely on certain conditions; one such condition is that the sender (Alice) and receiver (Bob) have isolated devices inaccessible to third parties. If an eavesdropper (Eve) has a side channel in one of the devices, then the key rate may be sensibly reduced. In this paper we consider an attack on a coherent-state protocol, where Eve not only taps the main communication channel but also hacks Alice's device. This is done by introducing a Trojan horse mode with low mean number of photons (n) over bar, which is then modulated in a similar way to the signal state. First we show that this strategy can be reduced to an attack without side channels but with higher loss and noise in the main channel. Then we show how the key rate rapidly deteriorates for increasing photons (n) over bar, being halved at long distances each time (n) over bar+ 1 doubles. Our work suggests that Alice's device should also be equipped with sensing systems that are able to detect and estimate the total number of incoming and outgoing photons.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Hacking Alice's box in continuous-variable quantum key distribution (vol 98, 062319, 2018)
    Pereira, Jason
    Pirandola, Stefano
    [J]. PHYSICAL REVIEW A, 2020, 102 (06)
  • [2] Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution
    Qin, Hao
    Kumar, Rupesh
    Alleaume, Romain
    [J]. PHYSICAL REVIEW A, 2016, 94 (01)
  • [3] Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack
    Huang, Jing-Zheng
    Weedbrook, Christian
    Yin, Zhen-Qiang
    Wang, Shuang
    Li, Hong-Wei
    Chen, Wei
    Guo, Guang-Can
    Han, Zheng-Fu
    [J]. PHYSICAL REVIEW A, 2013, 87 (06):
  • [4] Quantum Hacking on an Integrated Continuous-Variable Quantum Key Distribution System via Power Analysis
    Zheng, Yi
    Shi, Haobin
    Pan, Wei
    Wang, Quantao
    Mao, Jiahui
    [J]. ENTROPY, 2021, 23 (02) : 1 - 11
  • [5] Continuous-variable quantum key distribution
    Grosshans, F.
    Acin, A.
    Cerf, N. J.
    [J]. QUANTUM INFORMATION WITH CONTINOUS VARIABLES OF ATOMS AND LIGHT, 2007, : 63 - +
  • [6] Quantum hacking of continuous-variable quantum key distribution systems: realtime Trojan-horse attacks
    Stiller, B.
    Khan, I.
    Jain, N.
    Jouguet, P.
    Kunz-Jacques, S.
    Diamanti, E.
    Marquardt, Ch.
    Leuchs, G.
    [J]. 2015 CONFERENCE ON LASERS AND ELECTRO-OPTICS (CLEO), 2015,
  • [7] Multicarrier continuous-variable quantum key distribution
    Gyongyosi, Laszlo
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 816 : 67 - 95
  • [8] Unidimensional continuous-variable quantum key distribution
    Usenko, Vladyslav C.
    Grosshans, Frederic
    [J]. PHYSICAL REVIEW A, 2015, 92 (06):
  • [9] Optical attenuator-oriented quantum hacking on continuous-variable quantum key distribution with local local oscillator
    Mao, Yiyu
    Xie, Fengyang
    Zhao, Jiajia
    Huang, Wenti
    Zhao, Wei
    Guo, Ying
    Wang, Jin
    [J]. PHYSICA SCRIPTA, 2024, 99 (08)
  • [10] Artificial key fingerprints for continuous-variable quantum key distribution
    Yan, Yao
    Huang, Duan
    Yin, Pengzhi
    Luo, Haisen
    Chen, Jianfeng
    Mao, Yiyu
    Shi, Ronghua
    [J]. PHYSICAL REVIEW A, 2023, 108 (01)