Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack

被引:188
作者
Huang, Jing-Zheng [1 ]
Weedbrook, Christian [2 ,3 ]
Yin, Zhen-Qiang [1 ]
Wang, Shuang [1 ]
Li, Hong-Wei [1 ]
Chen, Wei [1 ]
Guo, Guang-Can [1 ]
Han, Zheng-Fu [1 ]
机构
[1] Univ Sci & Technol China, Key Lab Quantum Informat, Hefei 230026, Peoples R China
[2] Univ Toronto, Ctr Quantum Informat & Quantum Control, Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
[3] Univ Toronto, Dept Phys, Toronto, ON M5S 3G4, Canada
来源
PHYSICAL REVIEW A | 2013年 / 87卷 / 06期
基金
中国国家自然科学基金; 加拿大自然科学与工程研究理事会;
关键词
CRYPTOGRAPHY;
D O I
10.1103/PhysRevA.87.062329
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which allows the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final keys shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be randomly added before performing monitoring detection.
引用
收藏
页数:9
相关论文
共 29 条
[1]   COUPLING BETWEEN PARALLEL OPTICAL FIBER CORES - CRITICAL-EXAMINATION [J].
ANKIEWICZ, A ;
SNYDER, AW ;
ZHENG, XH .
JOURNAL OF LIGHTWAVE TECHNOLOGY, 1986, 4 (09) :1317-1323
[2]  
Arfken G., 2006, Mathematical Methods for Physicists, V6th ed.
[3]  
Bachor H.-A., 2003, A Guide to Experiments in Quantum Optics, V2nd
[4]   Quantum information with continuous variables [J].
Braunstein, SL ;
van Loock, P .
REVIEWS OF MODERN PHYSICS, 2005, 77 (02) :513-577
[5]  
Eisenmann M., 2010, J LIGHTWAVE TECHNOL, V6, P8588
[6]  
Garcia-Patron R., 2007, Quantum information with optical continuous variables: From Bell tests to key distribution
[7]   Full-field implementation of a perfect eavesdropper on a quantum cryptography system [J].
Gerhardt, Ilja ;
Liu, Qin ;
Lamas-Linares, Anta ;
Skaar, Johannes ;
Kurtsiefer, Christian ;
Makarov, Vadim .
NATURE COMMUNICATIONS, 2011, 2
[8]   Quantum cryptography [J].
Gisin, N ;
Ribordy, GG ;
Tittel, W ;
Zbinden, H .
REVIEWS OF MODERN PHYSICS, 2002, 74 (01) :145-195
[9]   Continuous-variable quantum cryptography is secure against non-Gaussian attacks [J].
Grosshans, F ;
Cerf, NJ .
PHYSICAL REVIEW LETTERS, 2004, 92 (04) :4
[10]  
Grosshans F, 2003, QUANTUM INF COMPUT, V3, P535