Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution

被引:7
|
作者
Zhao, Wei [1 ]
Shi, Ronghua [1 ]
Huang, Duan [1 ]
机构
[1] Cent S Univ, Sch Comp Sci & Engn, Changsha 410083, Hunan, Peoples R China
关键词
PHASE;
D O I
10.1038/s41598-019-54249-0
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
By manipulating the reference pulses amplitude, a security vulnerability is caused by self-reference continuous-variable quantum key distribution. In this paper, we formalize an attack strategy for reference pulses, showing that the proposed attack can compromise the practical security of CVQKD protocol. In this scheme, before the beam splitter attack, Eve intercepts the reference pulses emitted by Alice, using Bayesian algorithm to estimate phase shifts. Subsequently, other reference pulses are re-prepared and resubmitted to Bob. In simulations, Bayesian algorithm effectively estimates the phase drifts and has the high robustness to noise. Therefore, the eavesdropper can bias the excess noise due to the intercept-resend attack and the beam splitter attack. And Alice and Bob believe that their excess noise is below the null key threshold and can still share a secret key. Consequently, the proposed attack shows that its practical security can be compromised by transmitting the reference pulses in the continuous-variable quantum key distribution protocol.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Practical continuous-variable quantum key distribution with feasible optimization parameters
    Li MA
    Jie YANG
    Tao ZHANG
    Yun SHAO
    Jinlu LIU
    Yujie LUO
    Heng WANG
    Wei HUANG
    Fan FAN
    Chuang ZHOU
    Liangliang ZHANG
    Shuai ZHANG
    Yichen ZHANG
    Yang LI
    Bingjie XU
    Science China(Information Sciences), 2023, 66 (08) : 80 - 91
  • [32] Free space continuous-variable quantum key distribution with practical links
    Li, Ming
    Wang, Tianyi
    Han, Jiawei
    Yu, Zhongyuan
    Cvijetic, Milorad
    Ye, Han
    Liu, Yumin
    JOURNAL OF THE OPTICAL SOCIETY OF AMERICA B-OPTICAL PHYSICS, 2020, 37 (12) : 3690 - 3697
  • [33] Practical continuous-variable quantum key distribution with feasible optimization parameters
    Ma, Li
    Yang, Jie
    Zhang, Tao
    Shao, Yun
    Liu, Jinlu
    Luo, Yujie
    Wang, Heng
    Huang, Wei
    Fan, Fan
    Zhou, Chuang
    Zhang, Liangliang
    Zhang, Shuai
    Zhang, Yichen
    Li, Yang
    Xu, Bingjie
    SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (08)
  • [34] Effects of experimental impairments on the security of continuous-variable quantum key distribution
    Ruiz-Chamorro, Andres
    Cano, Daniel
    Garcia-Callejo, Aida
    Fernandez, Veronica
    HELIYON, 2023, 9 (06)
  • [35] Security of Continuous-Variable Quantum Key Distribution with Imperfect Phase Compensation
    Huang, Peng
    Lin, Da-kai
    Huang, Duan
    Zeng, Gui-Hua
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2015, 54 (08) : 2613 - 2622
  • [36] Performance analysis of practical continuous-variable quantum key distribution systems with weak randomness
    Zheng, Yi
    Huang, Peng
    Peng, Jinye
    Zhu, Yiqun
    Zeng, Guihua
    JOURNAL OF PHYSICS B-ATOMIC MOLECULAR AND OPTICAL PHYSICS, 2020, 53 (09)
  • [37] Security bound of continuous-variable quantum key distribution with discrete modulation
    Shen Yong
    Zou Hong-Xin
    ACTA PHYSICA SINICA, 2010, 59 (03) : 1473 - 1480
  • [38] Security Analysis of Unidimensional Continuous-Variable Quantum Key Distribution Using Uncertainty Relations
    Wang, Pu
    Wang, Xuyang
    Li, Yongmin
    ENTROPY, 2018, 20 (03)
  • [39] Security of discrete-modulated continuous-variable quantum key distribution
    Bauml, Stefan
    Pascual-Garcia, Carlos
    Wright, Victoria
    Fawzi, Omar
    Acin, Antonio
    QUANTUM, 2024, 8
  • [40] Security of Continuous-Variable Quantum Key Distribution Against General Attacks
    Leverrier, Anthony
    Garcia-Patron, Raul
    Renner, Renato
    Cerf, Nicolas J.
    PHYSICAL REVIEW LETTERS, 2013, 110 (03)