Faking photon number on a transition-edge sensor

被引:8
作者
Chaiwongkhot, Poompong [1 ,2 ,3 ,4 ]
Zhong, Jiaqiang [5 ,6 ]
Huang, Anqi [7 ,8 ]
Qin, Hao [9 ]
Shi, Sheng-cai [5 ,6 ]
Makarov, Vadim [10 ,11 ,12 ,13 ]
机构
[1] Univ Waterloo, Inst Quantum Comp, Waterloo, ON N2L 3G1, Canada
[2] Univ Waterloo, Dept Phys & Astron, Waterloo, ON N2L 3G1, Canada
[3] Mahidol Univ, Fac Sci, Dept Phys, Bangkok 10400, Thailand
[4] Quantum Technol Fdn Thailand, Bangkok 10110, Thailand
[5] Chinese Acad Sci, Purple Mt Observ, 10 Yuanhua Rd, Nanjing 210033, Peoples R China
[6] Chinese Acad Sci, Key Lab Radio Astron, 10 Yuanhua Rd, Nanjing 210033, Peoples R China
[7] Natl Univ Def Technol, Coll Comp Sci & Technol, Inst Quantum Informat, Changsha 410073, Peoples R China
[8] Natl Univ Def Technol, Coll Comp Sci & Technol, State Key Lab High Performance Comp, Changsha 410073, Peoples R China
[9] Natl Univ Singapore, Ctr Quantum Technol, 3 Sci Dr 2, Singapore 117543, Singapore
[10] Skolkovo, Russian Quantum Ctr, Moscow 121205, Russia
[11] Univ Sci & Technol China, Natl Lab Phys Sci Microscale, Shanghai Branch, Shanghai 201315, Peoples R China
[12] Univ Sci & Technol China, CAS Ctr Excellence Quantum Informat, Shanghai 201315, Peoples R China
[13] Natl Univ Sci & Technol MISiS, NTI Ctr Quantum Commun, Moscow 119049, Russia
基金
俄罗斯科学基金会; 国家重点研发计划; 加拿大自然科学与工程研究理事会; 中国国家自然科学基金;
关键词
QUANTUM KEY DISTRIBUTION; HIGH-SPEED; DETECTOR; ATTACK; COUNTERMEASURE; SECURITY; HACKING;
D O I
10.1140/epjqt/s40507-022-00141-2
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We study potential security vulnerabilities of a single-photon detector based on superconducting transition-edge sensor. In one experiment, we show that an adversary could fake a photon number result at a certain wavelength by sending a larger number of photons at a longer wavelength, which is an expected and known behaviour. In another experiment, we unexpectedly find that the detector can be blinded by bright continuous-wave light and then, a controlled response simulating single-photon detection can be produced by applying a bright light pulse. We model an intercept-and-resend attack on a quantum key distribution system that exploits the latter vulnerability and, under certain assumptions, able to steal the key.
引用
收藏
页数:10
相关论文
共 42 条
  • [1] Bennett C. H., 1984, P IEEE INT C COMP SY, P175, DOI DOI 10.1016/J.TCS.2014.05.025
  • [2] Berggren K. K., 2013, EXPT METHODS PHYS SC, V45, P185
  • [3] Low-noise ultra-high-speed dc SQUID readout electronics
    Drung, Dietmar
    Hinnrichs, Colmar
    Barthelmess, Henry-Jobes
    [J]. SUPERCONDUCTOR SCIENCE & TECHNOLOGY, 2006, 19 (05) : S235 - S241
  • [4] Invited Review Article: Single-photon sources and detectors
    Eisaman, M. D.
    Fan, J.
    Migdall, A.
    Polyakov, S. V.
    [J]. REVIEW OF SCIENTIFIC INSTRUMENTS, 2011, 82 (07)
  • [5] Countermeasure against bright-light attack on superconducting nanowire single-photon detector in quantum key distribution
    Elezov, Mikhail
    Ozhegov, Roman
    Goltsman, Gregory
    Makarov, Vadim
    [J]. OPTICS EXPRESS, 2019, 27 (21): : 30979 - 30988
  • [6] Quantum man-in-the-middle attack on the calibration process of quantum key distribution
    Fei, Yang-Yang
    Meng, Xiang-Dong
    Gao, Ming
    Wang, Hong
    Ma, Zhi
    [J]. SCIENTIFIC REPORTS, 2018, 8
  • [7] Confocal Microscopy Imaging with an Optical Transition Edge Sensor
    Fukuda, D.
    Niwa, K.
    Hattori, K.
    Inoue, S.
    Kobayashi, R.
    Numata, T.
    [J]. JOURNAL OF LOW TEMPERATURE PHYSICS, 2018, 193 (5-6) : 1228 - 1235
  • [8] Photon number resolving detection with high speed and high quantum efficiency
    Fukuda, D.
    Fujii, G.
    Numata, T.
    Yoshizawa, A.
    Tsuchida, H.
    Fujino, H.
    Ishii, H.
    Itatani, T.
    Inoue, S.
    Zama, T.
    [J]. METROLOGIA, 2009, 46 (04) : S288 - S292
  • [9] Titanium-based transition-edge photon number resolving detector with 98% detection efficiency with index-matched small-gap fiber coupling
    Fukuda, Daiji
    Fujii, Go
    Numata, Takayuki
    Amemiya, Kuniaki
    Yoshizawa, Akio
    Tsuchida, Hidemi
    Fujino, Hidetoshi
    Ishii, Hiroyuki
    Itatani, Taro
    Inoue, Shuichiro
    Zama, Tatsuya
    [J]. OPTICS EXPRESS, 2011, 19 (02): : 870 - 875
  • [10] Full-field implementation of a perfect eavesdropper on a quantum cryptography system
    Gerhardt, Ilja
    Liu, Qin
    Lamas-Linares, Anta
    Skaar, Johannes
    Kurtsiefer, Christian
    Makarov, Vadim
    [J]. NATURE COMMUNICATIONS, 2011, 2