Enhancing quantum time transfer security: detecting intercept-resend attacks with energy-time entanglement

被引:0
|
作者
Quan, Runai [1 ,2 ]
Hong, Huibo [1 ,2 ]
Xiang, Xiao [1 ,2 ]
Cao, Mingtao [1 ,2 ]
Li, Xinghua [1 ,2 ]
Li, Baihong [3 ]
Dong, Ruifang [1 ,2 ,4 ]
Liu, Tao [1 ,2 ,4 ]
Zhang, Shougang [1 ,2 ,4 ]
机构
[1] Chinese Acad Sci, Natl Time Serv Ctr, Key Lab Time Reference & Applicat, Xian 710600, Peoples R China
[2] Univ Chinese Acad Sci, Sch Astron & Space Sci, Beijing 100049, Peoples R China
[3] Shaanxi Univ Sci & Technol, Sch Phys & Informat Sci, Xian 710021, Peoples R China
[4] Hefei Natl Lab, Hefei 230088, Peoples R China
来源
NEW JOURNAL OF PHYSICS | 2024年 / 26卷 / 09期
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
nonlocal dispersion cancellation; nonlocality; energy-time entanglement; quantum time transfer; SYNCHRONIZATION;
D O I
10.1088/1367-2630/ad7634
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum time transfer has emerged as a powerful technique, offering sub-picosecond precision and inherent security through the nonlocal temporal correlation property of energy-time entangled biphoton sources. In this paper, we demonstrate the inherent security advantage of quantum time transfer, and the utilization in detecting potential intercept-resend attacks. By investigating the impact of these attacks on the nonlocality identifier associated with nonlocal dispersion cancellation of energy-time entanglement, we establish a security threshold model for detecting intercept-resend attacks. Experimental verification on a 102 km fiber-optic link confirms that even a malicious delay as small as 25 ps can be identified. This investigation serves as a compelling illustration of secure two-way time transfer, safeguarding against intercept-resend attacks, and showcasing its potential applications in fields reliant on authentic time distribution between remote parties.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability
    Zhang Sheng
    Wang Jian
    Tang Chao-Jing
    CHINESE PHYSICS B, 2012, 21 (06)
  • [2] Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability
    张盛
    王剑
    唐朝京
    Chinese Physics B, 2012, 21 (06) : 37 - 44
  • [3] Intercept-Resend Attacks on Semi-quantum Secret Sharing and the Improvements
    Jason Lin
    Chun-Wei Yang
    Chia-Wei Tsai
    Tzonelih Hwang
    International Journal of Theoretical Physics, 2013, 52 : 156 - 162
  • [4] Intercept-Resend Attacks on Semi-quantum Secret Sharing and the Improvements
    Lin, Jason
    Yang, Chun-Wei
    Tsai, Chia-Wei
    Hwang, Tzonelih
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2013, 52 (01) : 156 - 162
  • [5] Quantum key distribution with several intercept-resend attacks via a depolarizing channel
    Dehmani, Mustapha
    Errahmani, Mohamed
    Ez-Zahraouy, Hamid
    Benyoussef, Abdelilah
    PHYSICA SCRIPTA, 2012, 86 (01)
  • [6] Observation of quantum energy-time entanglement
    Eroshenko, Yu N.
    PHYSICS-USPEKHI, 2018, 61 (03) : 320 - 320
  • [7] Intercept-resend attacks on Chen et al.'s quantum private comparison protocol and the improvements
    Lin, Jason
    Tseng, Hsin-Yi
    Hwang, Tzonelih
    OPTICS COMMUNICATIONS, 2011, 284 (09) : 2412 - 2414
  • [8] Scheme of quantum dialogue based on four-particle omega state and security of intercept-resend attack
    Yang, You-Feng
    Ye, Zhi-Qing
    Guangzi Xuebao/Acta Photonica Sinica, 2013, 42 (10): : 1256 - 1260
  • [9] Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys
    Fladung, Lukas
    Nikolopoulos, Georgios M.
    Alber, Gernot
    Fischlin, Marc
    CRYPTOGRAPHY, 2019, 3 (04) : 1 - 17
  • [10] Multiparty multilevel energy-time entanglement
    Vallone, Giuseppe
    Mataloni, Paolo
    Cabello, Adan
    PHYSICAL REVIEW A, 2010, 81 (03):