Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack

被引:10
作者
Adrian Lizama-Perez, Luis [1 ]
Mauricio Lopez, Jose [2 ]
De Carlos Lopez, Eduardo [3 ]
机构
[1] Univ Politecn Pachuca, Grad Dept, Carretera Pachuca Cd Sahagun,Km 20, Municipio De Zempoala 43830, Hidalgo, Mexico
[2] Cinvestav Queretaro, Gen Management, Libramiento Norponiente 2000, Santiago De Queretaro 76230, Queretaro, Mexico
[3] Ctr Nacl Metrol, Time & Frequency Lab, Carretera Los Cues Km 4-5, Santiago De Queretaro 76246, Queretaro, Mexico
来源
ENTROPY | 2017年 / 19卷 / 01期
关键词
biqubit; double matching; single compatible; detection event; SYSTEMS; SARG04;
D O I
10.3390/e19010004
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Despite the unconditionally secure theory of the Quantum Key Distribution (QKD), several attacks have been successfully implemented against commercial QKD systems. Those systems have exhibited some flaws, as the secret key rate of corresponding protocols remains unaltered, while the eavesdropper obtains the entire secret key. We propose the negative acknowledgment state quantum key distribution protocol as a novel protocol capable of detecting the eavesdropping activity of the Intercept Resend with Faked Sates (IRFS) attack without requiring additional optical components different from the BB84 protocol because the system can be implemented as a high software module. In this approach, the transmitter interleaves pairs of quantum states, referred to here as parallel and orthogonal states, while the receiver uses active basis selection.
引用
收藏
页数:15
相关论文
共 29 条
  • [1] Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
  • [2] Bennett C.H, 1984, P 1984 INT C COMP SY
  • [3] Quantum relays for long distance quantum cryptography
    Collins, D
    Gisin, N
    De Riedmatten, H
    [J]. JOURNAL OF MODERN OPTICS, 2005, 52 (05) : 735 - 753
  • [4] Phase-remapping attack in practical quantum-key-distribution systems
    Fung, Chi-Hang Fred
    Qi, Bing
    Tamaki, Kiyoshi
    Lo, Hoi-Kwong
    [J]. PHYSICAL REVIEW A, 2007, 75 (03):
  • [5] Full-field implementation of a perfect eavesdropper on a quantum cryptography system
    Gerhardt, Ilja
    Liu, Qin
    Lamas-Linares, Anta
    Skaar, Johannes
    Kurtsiefer, Christian
    Makarov, Vadim
    [J]. NATURE COMMUNICATIONS, 2011, 2
  • [6] Countermeasure against tailored bright illumination attack for DPS-QKD
    Honjo, Toshimori
    Fujiwara, Mikio
    Shimizu, Kaoru
    Tamaki, Kiyoshi
    Miki, Shigehito
    Yamashita, Taro
    Terai, Hirotaka
    Wang, Zhen
    Sasaki, Masahide
    [J]. OPTICS EXPRESS, 2013, 21 (03): : 2667 - 2673
  • [7] Hughes R., SUMMARY IMPLEMENTATI
  • [8] Refining Quantum Cryptography
    Hughes, Richard
    Nordholt, Jane
    [J]. SCIENCE, 2011, 333 (6049) : 1584 - 1586
  • [9] Attacks on practical quantum key distribution systems (and how to prevent them)
    Jain, Nitin
    Stiller, Birgit
    Khan, Imran
    Elser, Dominique
    Marquardt, Christoph
    Leuchs, Gerd
    [J]. CONTEMPORARY PHYSICS, 2016, 57 (03) : 366 - 387
  • [10] Effects of depolarizing quantum channels on BB84 and SARG04 quantum cryptography protocols
    Jeong, Y-C
    Kim, Y-S
    Kim, Y-H
    [J]. LASER PHYSICS, 2011, 21 (08) : 1438 - 1442