Underwater Wavelength Attack on Discrete Modulated Continuous-Variable Quantum Key Distribution

被引:1
作者
Feng, Kangyi [1 ]
Wang, Yijun [1 ]
Li, Yin [1 ]
Wang, Yuang [1 ]
Zuo, Zhiyue [1 ]
Guo, Ying [1 ,2 ]
机构
[1] Cent South Univ, Sch Automat, Changsha 410083, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
wavelength attack; continuous-variable quantum key distribution; discrete modulated; underwater;
D O I
10.3390/e26060515
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The wavelength attack utilizes the dependence of beam splitters (BSs) on wavelength to cause legitimate users Alice and Bob to underestimate their excess noise so that Eve can steal more secret keys without being detected. Recently, the wavelength attack on Gaussian-modulated continuous-variable quantum key distribution (CV-QKD) has been researched in both fiber and atmospheric channels. However, the wavelength attack may also pose a threat to the case of ocean turbulent channels, which are vital for the secure communication of both ocean sensor networks and submarines. In this work, we propose two wavelength attack schemes on underwater discrete modulated (DM) CV-QKD protocol, which is effective for the case with and without local oscillator (LO) intensity monitor, respectively. In terms of the transmittance properties of the fused biconical taper (FBT) BS, two sets of wavelengths are determined for Eve's pulse manipulation, which are all located in the so-called blue-green band. The derived successful criterion shows that both attack schemes can control the estimated excess noise of Alice and Bob close to zero by selecting the corresponding condition parameters based on channel transmittance. Additionally, our numerical analysis shows that Eve can steal more bits when the wavelength attack controls the value of the estimated excess noise closer to zero.
引用
收藏
页数:13
相关论文
共 50 条
[31]   Gaussian-modulated continuous-variable quantum key distribution based on untrusted entanglement source br [J].
Qin, Liao ;
Liu, Hai-Jie ;
Zheng, Wang ;
Zhu, Ling-Jin .
ACTA PHYSICA SINICA, 2023, 72 (04)
[32]   Continuous-variable quantum key distribution based on continuous random basis choice [J].
Liu, Weiqi ;
Peng, Jinye ;
Huang, Peng ;
Wang, Shiyu ;
Wang, Tao ;
Zeng, Guihua .
CHINESE PHYSICS B, 2018, 27 (07)
[33]   Continuous-variable quantum key distribution based on continuous random basis choice [J].
刘维琪 ;
彭进业 ;
黄鹏 ;
汪诗寓 ;
王涛 ;
曾贵华 .
Chinese Physics B, 2018, 27 (07) :219-224
[34]   Probabilistic Amplitude Shaping for Continuous-Variable Quantum Key Distribution With Discrete Modulation Over a Wiretap Channel [J].
Notarnicola, Michele N. ;
Olivares, Stefano ;
Forestieri, Enrico ;
Parente, Emanuele ;
Poti, Luca ;
Secondini, Marco .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2024, 72 (01) :375-386
[35]   Security of Continuous-Variable Quantum Key Distribution with Imperfect Phase Compensation [J].
Huang, Peng ;
Lin, Da-kai ;
Huang, Duan ;
Zeng, Gui-Hua .
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2015, 54 (08) :2613-2622
[36]   An Improved Slice Reconciliation Protocol for Continuous-Variable Quantum Key Distribution [J].
Wen, Xuan ;
Li, Qiong ;
Mao, Haokun ;
Wen, Xiaojun ;
Chen, Nan .
ENTROPY, 2021, 23 (10)
[37]   An improved multidimensional reconciliation algorithm for continuous-variable quantum key distribution [J].
Li, Qiong ;
Wen, Xuan ;
Mao, Haokun ;
Wen, Xiaojun .
QUANTUM INFORMATION PROCESSING, 2019, 18 (01)
[38]   Plug-and-play unidimensional continuous-variable quantum key distribution [J].
Hang Zhang ;
Xinchao Ruan ;
Xiaodong Wu ;
Ling Zhang ;
Ying Guo ;
Duan Huang .
Quantum Information Processing, 2019, 18
[39]   Optimizing multidimensional reconciliation algorithm for continuous-variable quantum key distribution [J].
Dou L. ;
Guo D. ;
Wang X. .
Guangxue Xuebao/Acta Optica Sinica, 2016, 36 (09)
[40]   Plug-and-play unidimensional continuous-variable quantum key distribution [J].
Zhang, Hang ;
Ruan, Xinchao ;
Wu, Xiaodong ;
Zhang, Ling ;
Guo, Ying ;
Huang, Duan .
QUANTUM INFORMATION PROCESSING, 2019, 18 (05)