Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution

被引:7
|
作者
Zhao, Wei [1 ]
Shi, Ronghua [1 ]
Huang, Duan [1 ]
机构
[1] Cent S Univ, Sch Comp Sci & Engn, Changsha 410083, Hunan, Peoples R China
关键词
PHASE;
D O I
10.1038/s41598-019-54249-0
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
By manipulating the reference pulses amplitude, a security vulnerability is caused by self-reference continuous-variable quantum key distribution. In this paper, we formalize an attack strategy for reference pulses, showing that the proposed attack can compromise the practical security of CVQKD protocol. In this scheme, before the beam splitter attack, Eve intercepts the reference pulses emitted by Alice, using Bayesian algorithm to estimate phase shifts. Subsequently, other reference pulses are re-prepared and resubmitted to Bob. In simulations, Bayesian algorithm effectively estimates the phase drifts and has the high robustness to noise. Therefore, the eavesdropper can bias the excess noise due to the intercept-resend attack and the beam splitter attack. And Alice and Bob believe that their excess noise is below the null key threshold and can still share a secret key. Consequently, the proposed attack shows that its practical security can be compromised by transmitting the reference pulses in the continuous-variable quantum key distribution protocol.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Asymptotic Security of Continuous-Variable Quantum Key Distribution with a Discrete Modulation
    Ghorai, Shouvik
    Grangier, Philippe
    Diamanti, Eleni
    Leverrier, Anthony
    PHYSICAL REVIEW X, 2019, 9 (02)
  • [42] Security of plug-and-play continuous-variable quantum key distribution
    Goncharov, R. K.
    Kirichenko, D. N.
    Vorontsova, I. O.
    Filipov, I. M.
    Adam, Y. A.
    Pervushin, B. E.
    Nasedkin, B. A.
    Samsonov, E. O.
    Egorov, V., I
    JOURNAL OF OPTICAL TECHNOLOGY, 2022, 89 (07) : 430 - 433
  • [43] Security of Continuous-Variable Quantum Key Distribution with Imperfect Phase Compensation
    Peng Huang
    Da-kai Lin
    Duan Huang
    Gui-Hua Zeng
    International Journal of Theoretical Physics, 2015, 54 : 2613 - 2622
  • [44] Asymptotic Security Analysis of Discrete-Modulated Continuous-Variable Quantum Key Distribution
    Lin, Jie
    Upadhyaya, Twesh
    Lutkenhaus, Norbert
    PHYSICAL REVIEW X, 2019, 9 (04)
  • [45] Security of continuous-variable quantum key distribution against canonical attacks
    Papanastasiou, Panagiotis
    Ottaviani, Carlo
    Pirandola, Stefano
    30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
  • [46] Security analysis of unidimensional continuous-variable quantum key distribution with discretized amplitude modulation
    Li, Yingying
    Wang, Tianyi
    JOURNAL OF PHYSICS B-ATOMIC MOLECULAR AND OPTICAL PHYSICS, 2024, 57 (14)
  • [47] Adjusting Optical Polarization with Machine Learning for Enhancing Practical Security of Continuous-Variable Quantum Key Distribution
    Zhou, Zicheng
    Guo, Ying
    ELECTRONICS, 2024, 13 (08)
  • [48] Finite sampling bandwidth effect on practical security of discretely modulated continuous-variable quantum key distribution
    Hu, Junkai
    Wang, Yijun
    Mao, Yun
    Xiong, Sha
    Liao, Qin
    Guo, Ying
    QUANTUM INFORMATION PROCESSING, 2022, 22 (01)
  • [49] Finite sampling bandwidth effect on practical security of discretely modulated continuous-variable quantum key distribution
    Junkai Hu
    Yijun Wang
    Yun Mao
    Sha Xiong
    Qin Liao
    Ying Guo
    Quantum Information Processing, 22
  • [50] Practical security of the continuous-variable quantum key distribution with real local oscillators under phase attack
    Huang, Biao
    Huang, Yongmei
    Peng, Zhenming
    OPTICS EXPRESS, 2019, 27 (15) : 20621 - 20631