Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution

被引:7
|
作者
Zhao, Wei [1 ]
Shi, Ronghua [1 ]
Huang, Duan [1 ]
机构
[1] Cent S Univ, Sch Comp Sci & Engn, Changsha 410083, Hunan, Peoples R China
关键词
PHASE;
D O I
10.1038/s41598-019-54249-0
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
By manipulating the reference pulses amplitude, a security vulnerability is caused by self-reference continuous-variable quantum key distribution. In this paper, we formalize an attack strategy for reference pulses, showing that the proposed attack can compromise the practical security of CVQKD protocol. In this scheme, before the beam splitter attack, Eve intercepts the reference pulses emitted by Alice, using Bayesian algorithm to estimate phase shifts. Subsequently, other reference pulses are re-prepared and resubmitted to Bob. In simulations, Bayesian algorithm effectively estimates the phase drifts and has the high robustness to noise. Therefore, the eavesdropper can bias the excess noise due to the intercept-resend attack and the beam splitter attack. And Alice and Bob believe that their excess noise is below the null key threshold and can still share a secret key. Consequently, the proposed attack shows that its practical security can be compromised by transmitting the reference pulses in the continuous-variable quantum key distribution protocol.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Composable security of unidimensional continuous-variable quantum key distribution
    Liao, Qin
    Guo, Ying
    Xie, Cailang
    Huang, Duan
    Huang, Peng
    Zeng, Guihua
    QUANTUM INFORMATION PROCESSING, 2018, 17 (05)
  • [22] Security analysis of discretized polar modulation continuous-variable quantum key distribution
    Wang, T. I. A. N. Y. I.
    LI, M. I. N. G.
    Wang, X. U.
    OPTICS EXPRESS, 2022, 30 (20) : 36122 - 36133
  • [23] Phase attack on reference pulses of continuous-variable quantum key distribution with real local oscillators
    Huang, Biao
    Liu, Langhua
    Wang, Yu
    Huang, Yongmei
    Peng, Zhenming
    QUANTUM INFORMATION TECHNOLOGY (AOPC 2019), 2019, 11339
  • [24] Security analysis of continuous-variable quantum key distribution with imperfect Faraday mirror
    Liang, Kexin
    Cao, Zhengwen
    Liu, Weiqi
    Wang, Jiayao
    Chai, Geng
    Zhang, Tongyi
    LASER PHYSICS LETTERS, 2019, 16 (11)
  • [25] Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution
    Pan, Yaxi
    Zhang, Ling
    Huang, Duan
    APPLIED SCIENCES-BASEL, 2020, 10 (21): : 1 - 16
  • [26] Practical security of a chip-based continuous-variable quantum-key-distribution system
    Li, Lang
    Huang, Peng
    Wang, Tao
    Zeng, Guihua
    PHYSICAL REVIEW A, 2021, 103 (03)
  • [27] Practical security of continuous-variable quantum key distribution involving saturation attack with finite-size analysis
    Mao, Yun
    Li, Yin
    Guo, Ying
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2022, 55 (25)
  • [28] Continuous-variable quantum key distribution
    Grosshans, F.
    Acin, A.
    Cerf, N. J.
    QUANTUM INFORMATION WITH CONTINOUS VARIABLES OF ATOMS AND LIGHT, 2007, : 63 - +
  • [29] Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution
    Qin, Hao
    Kumar, Rupesh
    Alleaume, Romain
    PHYSICAL REVIEW A, 2016, 94 (01)
  • [30] Robust continuous-variable quantum key distribution against practical attacks
    Huang, Peng
    Huang, Jingzheng
    Wang, Tao
    Li, Huasheng
    Huang, Duan
    Zeng, Guihua
    PHYSICAL REVIEW A, 2017, 95 (05)