Saturation Attack On Continuous-Variable Quantum Key Distribution System

被引:20
作者
Qin, Hao [1 ]
Kumar, Rupesh [1 ]
Alleaume, Romain [1 ]
机构
[1] Telecom ParisTech, Lab Traitement & Commun Informat, Ctr Natl Rech Sci, F-75634 Paris 13, France
来源
EMERGING TECHNOLOGIES IN SECURITY AND DEFENCE; AND QUANTUM SECURITY II; AND UNMANNED SENSOR SYSTEMS X | 2013年 / 8899卷
关键词
Quantum key distribution; Continuous-variable; Side channel attack; Practical secruity;
D O I
10.1117/12.2028543
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Continuous-variable quantum key distribution is proven in theory secure against general attacks, but side channel is still a crucial problem for practical setup, since security proofs do not take into account all possible experimental imperfections. In this paper, we consider a loophole that links to electronics limitation of homodyne detection. By using this loophole, we propose a saturation attack combined with intercept-resend attack on the practical continuous-variable quantum key distribution using Gaussian-modulated coherent state protocol. Under this attack, Eve can launch a full intercept-resend attack and further influence the excess noise estimated by Alice and Bob. We analyse this saturation attack with operating protocol and show that our attack could render secret key without being discovered. We also propose a countermeasure against such saturation attack.
引用
收藏
页数:7
相关论文
共 20 条
[1]   Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution [J].
Garcia-Patron, Raul ;
Cerf, Nicolas J. .
PHYSICAL REVIEW LETTERS, 2006, 97 (19)
[2]   Full-field implementation of a perfect eavesdropper on a quantum cryptography system [J].
Gerhardt, Ilja ;
Liu, Qin ;
Lamas-Linares, Anta ;
Skaar, Johannes ;
Kurtsiefer, Christian ;
Makarov, Vadim .
NATURE COMMUNICATIONS, 2011, 2
[3]   Quantum key distribution using gaussian-modulated coherent states [J].
Grosshans, F ;
Van Assche, G ;
Wenger, J ;
Brouri, R ;
Cerf, NJ ;
Grangier, P .
NATURE, 2003, 421 (6920) :238-241
[4]   Testing quantum devices:: Practical entanglement verification in bipartite optical systems [J].
Haeseler, Hauke ;
Moroder, Tobias ;
Luetkenhaus, Norbert .
PHYSICAL REVIEW A, 2008, 77 (03)
[5]   Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack [J].
Huang, Jing-Zheng ;
Weedbrook, Christian ;
Yin, Zhen-Qiang ;
Wang, Shuang ;
Li, Hong-Wei ;
Chen, Wei ;
Guo, Guang-Can ;
Han, Zheng-Fu .
PHYSICAL REVIEW A, 2013, 87 (06)
[6]   Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution [J].
Jouguet, Paul ;
Kunz-Jacques, Sebastien ;
Diamanti, Eleni .
PHYSICAL REVIEW A, 2013, 87 (06)
[7]   Analysis of imperfections in practical continuous-variable quantum key distribution [J].
Jouguet, Paul ;
Kunz-Jacques, Sebastien ;
Diamanti, Eleni ;
Leverrier, Anthony .
PHYSICAL REVIEW A, 2012, 86 (03)
[8]   Long-distance continuous-variable quantum key distribution with a Gaussian modulation [J].
Jouguet, Paul ;
Kunz-Jacques, Sebastien ;
Leverrier, Anthony .
PHYSICAL REVIEW A, 2011, 84 (06)
[9]   Security of Continuous-Variable Quantum Key Distribution Against General Attacks [J].
Leverrier, Anthony ;
Garcia-Patron, Raul ;
Renner, Renato ;
Cerf, Nicolas J. .
PHYSICAL REVIEW LETTERS, 2013, 110 (03)
[10]   Quantum key distribution over 25 km with an all-fiber continuous-variable system [J].
Lodewyck, Jerome ;
Bloch, Matthieu ;
Garcia-Patron, Raul ;
Fossier, Simon ;
Karpov, Evgueni ;
Diamanti, Eleni ;
Debuisschert, Thierry ;
Cerf, Nicolas J. ;
Tualle-Brouri, Rosa ;
McLaughlin, Steven W. ;
Grangier, Philippe .
PHYSICAL REVIEW A, 2007, 76 (04)