Hacking single-photon avalanche detectors in quantum key distribution via pulse illumination

被引:20
作者
Wu, Zhihao [1 ,2 ]
Huang, Anqi [1 ,2 ]
Chen, Huan [3 ]
Sun, Shi-Hai [4 ]
Ding, Jiangfang [1 ,2 ]
Qiang, Xiaogang [1 ,2 ,5 ]
Fu, Xiang [1 ,2 ]
Xu, Ping [1 ,2 ]
Wu, Junjie [1 ,2 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Inst Quantum Informat, Changsha 410073, Peoples R China
[2] Natl Univ Def Technol, Coll Comp, State Key Lab High Performance Comp, Changsha 410073, Peoples R China
[3] Natl Univ Def Technol, Coll Liberal Arts & Sci, Changsha 410073, Peoples R China
[4] Sun Yat Sen Univ, Sch Phys & Astron, Zhuhai 519082, Peoples R China
[5] AMS, Natl Innovat Inst Def Technol, Beijing 100071, Peoples R China
基金
中国国家自然科学基金;
关键词
SECURITY; ATTACK;
D O I
10.1364/OE.397962
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Quantum key distribution (QKD) has been proved to be information-theoretically secure in theory. Unfortunately, the imperfect devices in practice compromise its security. Thus, to improve the security property of practical QKD systems, a commonly used method is to patch the loopholes in the existing QKD systems. However, in this work, we show an adversary's capability of exploiting the imperfection of the patch itself to bypass the patch. Specifically, we experimentally demonstrate that, in the detector under test, the patch of photocurrent monitor against the detector blinding attack can be defeated by the pulse illumination attack proposed in this paper. We also analyze the secret key rate under the pulse illumination attack, which theoretically confirmed that Eve can conduct the attack to learn the secret key. This work indicates the importance of inspecting the security loopholes in a detection unit to further understand their impacts on a QKD system. The method of pulse illumination attack can be a general testing item in the security evaluation standard of QKD. (C) 2020 Optical Society of America under the terms of the OSA Open Access Publishing Agreement
引用
收藏
页码:25574 / 25590
页数:17
相关论文
共 49 条
[1]  
[Anonymous], 2018, IEEE COMMUN STANDARD, V2, P4
[2]  
[Anonymous], 2015, 8 ETSI
[3]  
[Anonymous], 1984, P IEEE INT C COMP, DOI DOI 10.1016/J.TCS.2014.05.025
[4]   Limitations on practical quantum cryptography [J].
Brassard, G ;
Lütkenhaus, N ;
Mor, T ;
Sanders, BC .
PHYSICAL REVIEW LETTERS, 2000, 85 (06) :1330-1333
[5]   Laser Damage Helps the Eavesdropper in Quantum Cryptography [J].
Bugge, Audun Nystad ;
Sauge, Sebastien ;
Ghazali, Aina Mardhiyah M. ;
Skaar, Johannes ;
Lydersen, Lars ;
Makarov, Vadim .
PHYSICAL REVIEW LETTERS, 2014, 112 (07)
[6]   Controlling single-photon detector ID210 with bright light [J].
Chistiakov, Vladimir ;
Huang, Anqi ;
Egorov, Vladimir ;
Makarov, Vadim .
OPTICS EXPRESS, 2019, 27 (22) :32253-32262
[7]   Evolution and prospects for single-photon avalanche diodes and quenching circuits [J].
Cova, S ;
Ghioni, M ;
Lotito, A ;
Rech, I ;
Zappa, F .
JOURNAL OF MODERN OPTICS, 2004, 51 (9-10) :1267-1288
[8]   Simple security proof of twin-field type quantum key distribution protocol [J].
Curty, Marcos ;
Azuma, Koji ;
Lo, Hoi-Kwong .
NPJ QUANTUM INFORMATION, 2019, 5 (1)
[9]   Real-time monitoring of single-photon detectors against eavesdropping in quantum key distribution systems [J].
da Silva, Thiago Ferreira ;
Xavier, Guilherme B. ;
Temporao, Guilherme P. ;
von der Weid, Jean Pierre .
OPTICS EXPRESS, 2012, 20 (17) :18911-18924
[10]   High-dimensional quantum key distribution based on multicore fiber using silicon photonic integrated circuits [J].
Ding, Yunhong ;
Bacco, Davide ;
Dalgaard, Kjeld ;
Cai, Xinlun ;
Zhou, Xiaoqi ;
Rottwitt, Karsten ;
Oxenlowe, Leif Katsuo .
NPJ QUANTUM INFORMATION, 2017, 3