Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack

被引:11
作者
Adrian Lizama-Perez, Luis [1 ]
Mauricio Lopez, Jose [2 ]
De Carlos Lopez, Eduardo [3 ]
机构
[1] Univ Politecn Pachuca, Grad Dept, Carretera Pachuca Cd Sahagun,Km 20, Municipio De Zempoala 43830, Hidalgo, Mexico
[2] Cinvestav Queretaro, Gen Management, Libramiento Norponiente 2000, Santiago De Queretaro 76230, Queretaro, Mexico
[3] Ctr Nacl Metrol, Time & Frequency Lab, Carretera Los Cues Km 4-5, Santiago De Queretaro 76246, Queretaro, Mexico
关键词
biqubit; double matching; single compatible; detection event; SYSTEMS; SARG04;
D O I
10.3390/e19010004
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Despite the unconditionally secure theory of the Quantum Key Distribution (QKD), several attacks have been successfully implemented against commercial QKD systems. Those systems have exhibited some flaws, as the secret key rate of corresponding protocols remains unaltered, while the eavesdropper obtains the entire secret key. We propose the negative acknowledgment state quantum key distribution protocol as a novel protocol capable of detecting the eavesdropping activity of the Intercept Resend with Faked Sates (IRFS) attack without requiring additional optical components different from the BB84 protocol because the system can be implemented as a high software module. In this approach, the transmitter interleaves pairs of quantum states, referred to here as parallel and orthogonal states, while the receiver uses active basis selection.
引用
收藏
页数:15
相关论文
共 29 条
[1]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[2]  
Bennett C.H, 1984, P 1984 INT C COMP SY
[3]   Quantum relays for long distance quantum cryptography [J].
Collins, D ;
Gisin, N ;
De Riedmatten, H .
JOURNAL OF MODERN OPTICS, 2005, 52 (05) :735-753
[4]   Phase-remapping attack in practical quantum-key-distribution systems [J].
Fung, Chi-Hang Fred ;
Qi, Bing ;
Tamaki, Kiyoshi ;
Lo, Hoi-Kwong .
PHYSICAL REVIEW A, 2007, 75 (03)
[5]   Full-field implementation of a perfect eavesdropper on a quantum cryptography system [J].
Gerhardt, Ilja ;
Liu, Qin ;
Lamas-Linares, Anta ;
Skaar, Johannes ;
Kurtsiefer, Christian ;
Makarov, Vadim .
NATURE COMMUNICATIONS, 2011, 2
[6]   Countermeasure against tailored bright illumination attack for DPS-QKD [J].
Honjo, Toshimori ;
Fujiwara, Mikio ;
Shimizu, Kaoru ;
Tamaki, Kiyoshi ;
Miki, Shigehito ;
Yamashita, Taro ;
Terai, Hirotaka ;
Wang, Zhen ;
Sasaki, Masahide .
OPTICS EXPRESS, 2013, 21 (03) :2667-2673
[7]  
Hughes R., SUMMARY IMPLEMENTATI
[8]   Refining Quantum Cryptography [J].
Hughes, Richard ;
Nordholt, Jane .
SCIENCE, 2011, 333 (6049) :1584-1586
[9]   Attacks on practical quantum key distribution systems (and how to prevent them) [J].
Jain, Nitin ;
Stiller, Birgit ;
Khan, Imran ;
Elser, Dominique ;
Marquardt, Christoph ;
Leuchs, Gerd .
CONTEMPORARY PHYSICS, 2016, 57 (03) :366-387
[10]   Effects of depolarizing quantum channels on BB84 and SARG04 quantum cryptography protocols [J].
Jeong, Y-C ;
Kim, Y-S ;
Kim, Y-H .
LASER PHYSICS, 2011, 21 (08) :1438-1442