Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states

被引:21
作者
Jiang, Mu-Sheng [1 ]
Sun, Shi-Hai [1 ]
Li, Chun-Yan [1 ]
Liang, Lin-Mei [1 ,2 ]
机构
[1] Natl Univ Def Technol, Dept Phys, Changsha 410073, Hunan, Peoples R China
[2] Natl Univ Def Technol, State Key Lab High Performance Comp, Changsha 410073, Hunan, Peoples R China
来源
PHYSICAL REVIEW A | 2012年 / 86卷 / 03期
基金
中国国家自然科学基金;
关键词
SECURITY;
D O I
10.1103/PhysRevA.86.032310
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Any imperfections in a practical quantum key distribution (QKD) system may be exploited by an eavesdropper (Eve) to collect information about the key without being discovered. For example, without the decoy-state method, Eve can perform the photon-number-splitting (PNS) attack and get full information without introducing any perturbation, since weak laser pulses are widely used in practical systems instead of single-photon sources. However, the decoy-state method against PNS attack itself may introduce another loophole while closing the loophole of multiphoton pulses. In this paper, a fatal loophole of practical decoy-state plug-and-play QKD systems has been exploited and a wavelength-selected photon-number-splitting (WSPNS) attack scheme against plug-and-play QKD systems with the decoy-state method is proposed. Theoretical analysis shows that the eavesdropper can get full information about the key generated between the legitimate parties just like the PNS attack was performed in plug-and-play QKD systems without the decoy-state method.
引用
收藏
页数:8
相关论文
共 31 条
[1]   Generation of frequency-chirped laser pulses by an electro-optic amplitude modulator [J].
Bakos, J. S. ;
Djotyan, G. P. ;
Ignacz, P. N. ;
Kedves, M. A. ;
Raczkevi, B. ;
Sorlei, Zs. ;
Szigeti, J. .
OPTICS AND LASERS IN ENGINEERING, 2009, 47 (01) :19-23
[2]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[3]   Limitations on practical quantum cryptography [J].
Brassard, G ;
Lütkenhaus, N ;
Mor, T ;
Sanders, BC .
PHYSICAL REVIEW LETTERS, 2000, 85 (06) :1330-1333
[4]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[5]   Phase-remapping attack in practical quantum-key-distribution systems [J].
Fung, Chi-Hang Fred ;
Qi, Bing ;
Tamaki, Kiyoshi ;
Lo, Hoi-Kwong .
PHYSICAL REVIEW A, 2007, 75 (03)
[6]   Trojan-horse attacks on quantum-key-distribution systems [J].
Gisin, N ;
Fasel, S ;
Kraus, B ;
Zbinden, H ;
Ribordy, G .
PHYSICAL REVIEW A, 2006, 73 (02)
[7]   Quantum key distribution over 122 km of standard telecom fiber [J].
Gobby, C ;
Yuan, ZL ;
Shields, AJ .
APPLIED PHYSICS LETTERS, 2004, 84 (19) :3762-3764
[8]  
Gottesman D, 2004, QUANTUM INF COMPUT, V4, P325
[9]   Quantum key distribution with high loss: Toward global secure communication [J].
Hwang, WY .
PHYSICAL REVIEW LETTERS, 2003, 91 (05) :579011-579014
[10]   Device Calibration Impacts Security of Quantum Key Distribution [J].
Jain, Nitin ;
Wittmann, Christoffer ;
Lydersen, Lars ;
Wiechers, Carlos ;
Elser, Dominique ;
Marquardt, Christoph ;
Makarov, Vadim ;
Leuchs, Gerd .
PHYSICAL REVIEW LETTERS, 2011, 107 (11)