Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution

被引:7
|
作者
Zhao, Wei [1 ]
Shi, Ronghua [1 ]
Huang, Duan [1 ]
机构
[1] Cent S Univ, Sch Comp Sci & Engn, Changsha 410083, Hunan, Peoples R China
关键词
PHASE;
D O I
10.1038/s41598-019-54249-0
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
By manipulating the reference pulses amplitude, a security vulnerability is caused by self-reference continuous-variable quantum key distribution. In this paper, we formalize an attack strategy for reference pulses, showing that the proposed attack can compromise the practical security of CVQKD protocol. In this scheme, before the beam splitter attack, Eve intercepts the reference pulses emitted by Alice, using Bayesian algorithm to estimate phase shifts. Subsequently, other reference pulses are re-prepared and resubmitted to Bob. In simulations, Bayesian algorithm effectively estimates the phase drifts and has the high robustness to noise. Therefore, the eavesdropper can bias the excess noise due to the intercept-resend attack and the beam splitter attack. And Alice and Bob believe that their excess noise is below the null key threshold and can still share a secret key. Consequently, the proposed attack shows that its practical security can be compromised by transmitting the reference pulses in the continuous-variable quantum key distribution protocol.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution
    Wei Zhao
    Ronghua Shi
    Duan Huang
    Scientific Reports, 9
  • [2] Practical continuous-variable quantum key distribution with composable security
    Nitin Jain
    Hou-Man Chin
    Hossein Mani
    Cosmo Lupo
    Dino Solar Nikolic
    Arne Kordts
    Stefano Pirandola
    Thomas Brochmann Pedersen
    Matthias Kolb
    Bernhard Ömer
    Christoph Pacher
    Tobias Gehring
    Ulrik L. Andersen
    Nature Communications, 13
  • [3] Practical continuous-variable quantum key distribution with composable security
    Jain, Nitin
    Chin, Hou-Man
    Mani, Hossein
    Lupo, Cosmo
    Nikolic, Dino Solar
    Kordts, Arne
    Pirandola, Stefano
    Pedersen, Thomas Brochmann
    Kolb, Matthias
    Omer, Bernhard
    Pacher, Christoph
    Gehring, Tobias
    Andersen, Ulrik L.
    NATURE COMMUNICATIONS, 2022, 13 (01)
  • [4] Towards practical security of continuous-variable quantum key distribution
    Lupo, Cosmo
    PHYSICAL REVIEW A, 2020, 102 (02)
  • [5] Practical security of continuous-variable quantum key distribution with an optical amplifier
    Zheng, Yi
    Wang, Yiliang
    Fang, Chenlei
    Shi, Haobin
    Pan, Wei
    PHYSICAL REVIEW A, 2024, 109 (02)
  • [6] Practical security analysis of continuous-variable quantum key distribution with jitter in clock synchronization
    Xie, Cailang
    Guo, Ying
    Liao, Qin
    Zhao, Wei
    Huang, Duan
    Zhang, Ling
    Zeng, Guihua
    PHYSICS LETTERS A, 2018, 382 (12) : 811 - 817
  • [7] Practical security analysis of continuous-variable quantum key distribution with an unbalanced heterodyne detector
    Kong, Lingzhi
    Liu, Weiqi
    Jing, Fan
    He, Chen
    CHINESE PHYSICS B, 2022, 31 (07)
  • [8] Practical security analysis of continuous-variable quantum key distribution with an unbalanced heterodyne detector
    孔令志
    刘维琪
    荆凡
    贺晨
    Chinese Physics B, 2022, 31 (07) : 147 - 154
  • [9] Analysis of imperfections in practical continuous-variable quantum key distribution
    Jouguet, Paul
    Kunz-Jacques, Sebastien
    Diamanti, Eleni
    Leverrier, Anthony
    PHYSICAL REVIEW A, 2012, 86 (03):
  • [10] Security analysis of continuous-variable quantum key distribution scheme
    Zhu Jun
    He Guang-Qiang
    Zeng Gui-Hua
    CHINESE PHYSICS, 2007, 16 (05): : 1364 - 1369