Practical security analysis of continuous-variable quantum key distribution with jitter in clock synchronization

被引:14
|
作者
Xie, Cailang [1 ]
Guo, Ying [1 ]
Liao, Qin [1 ]
Zhao, Wei [1 ]
Huang, Duan [1 ]
Zhang, Ling [1 ]
Zeng, Guihua [2 ,3 ]
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Peoples R China
[2] Shanghai Jiao Tong Univ, State Key Lab Adv Opt Commun Syst & Networks, Shanghai 200240, Peoples R China
[3] Shanghai Jiao Tong Univ, Ctr Quantum Informat Sensing & Proc, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
CV-QKD; Security analysis; Clock synchronization; Jitter; TIME; DETECTOR; ATTACK; STATES;
D O I
10.1016/j.physleta.2018.01.006
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
How to narrow the gap of security between theory and practice has been a notoriously urgent problem in quantum cryptography. Here, we analyze and provide experimental evidence of the clock jitter effect on the practical continuous-variable quantum key distribution (CV-QKD) system. The clock jitter is a random noise which exists permanently in the clock synchronization in the practical CV-QKD system, it may compromise the system security because of its impact on data sampling and parameters estimation. In particular, the practical security of CV-QKD with different clock jitter against collective attack is analyzed theoretically based on different repetition frequencies, the numerical simulations indicate that the clock jitter has more impact on a high-speed scenario. Furthermore, a simplified experiment is designed to investigate the influence of the clock jitter. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:811 / 817
页数:7
相关论文
共 50 条
  • [21] Practical source monitoring for continuous-variable quantum key distribution
    Chu, Binjie
    Zhang, Yichen
    Huang, Yundi
    Yu, Song
    Chen, Ziyang
    Guo, Hong
    QUANTUM SCIENCE AND TECHNOLOGY, 2021, 6 (02):
  • [22] Composable security of unidimensional continuous-variable quantum key distribution
    Qin Liao
    Ying Guo
    Cailang Xie
    Duan Huang
    Peng Huang
    Guihua Zeng
    Quantum Information Processing, 2018, 17
  • [23] Composable security of unidimensional continuous-variable quantum key distribution
    Liao, Qin
    Guo, Ying
    Xie, Cailang
    Huang, Duan
    Huang, Peng
    Zeng, Guihua
    QUANTUM INFORMATION PROCESSING, 2018, 17 (05)
  • [24] Security analysis of discretized polar modulation continuous-variable quantum key distribution
    Wang, T. I. A. N. Y. I.
    LI, M. I. N. G.
    Wang, X. U.
    OPTICS EXPRESS, 2022, 30 (20) : 36122 - 36133
  • [25] Security analysis of continuous-variable quantum key distribution with imperfect Faraday mirror
    Liang, Kexin
    Cao, Zhengwen
    Liu, Weiqi
    Wang, Jiayao
    Chai, Geng
    Zhang, Tongyi
    LASER PHYSICS LETTERS, 2019, 16 (11)
  • [26] Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution
    Pan, Yaxi
    Zhang, Ling
    Huang, Duan
    APPLIED SCIENCES-BASEL, 2020, 10 (21): : 1 - 16
  • [27] Practical security of a chip-based continuous-variable quantum-key-distribution system
    Li, Lang
    Huang, Peng
    Wang, Tao
    Zeng, Guihua
    PHYSICAL REVIEW A, 2021, 103 (03)
  • [28] Practical security of continuous-variable quantum key distribution involving saturation attack with finite-size analysis
    Mao, Yun
    Li, Yin
    Guo, Ying
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2022, 55 (25)
  • [29] Continuous-variable quantum key distribution
    Grosshans, F.
    Acin, A.
    Cerf, N. J.
    QUANTUM INFORMATION WITH CONTINOUS VARIABLES OF ATOMS AND LIGHT, 2007, : 63 - +
  • [30] Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution
    Qin, Hao
    Kumar, Rupesh
    Alleaume, Romain
    PHYSICAL REVIEW A, 2016, 94 (01)