Frequency shift attack on 'plug-and-play' quantum key distribution systems

被引:6
作者
Jiang, Mu-Sheng [1 ]
Sun, Shi-Hai [1 ]
Li, Chun-Yan [1 ]
Liang, Lin-Mei [1 ,2 ]
机构
[1] Natl Univ Def Technol, Dept Phys, Changsha 410073, Hunan, Peoples R China
[2] Natl Univ Def Technol, State Key Lab High Performance Comp, Changsha 410073, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
quantum cryptography; quantum key distribution; plug-and-play' systems; frequency shift attack; phase-coding BB84 protocol; phase modulation; SECURITY; STATES; PROOF;
D O I
10.1080/09500340.2013.872309
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Many imperfections in a practical quantum key distribution (QKD) system have been exploited by an eavesdropper (Eve) to attack the system. However, most of these attacks will introduce perturbations to the system while collecting information about the key. For example, the phase-remapping attack [Phys. Rev. A2007,75, 032314], in which Eve performs time shift on the signal pulse from the constant acting range of the phase modulation voltage to its rising edge to introduce an imperfection, results in an quantum bit error rate (QBER) of 14.6%, which is too high and will be discovered by careful users. In this paper, a frequency shift (FS) attack on plug-and-play' QKD systems with phase-coding BB84 protocol is proposed, in which Eve introduces an imperfection by the same method as she used in the phase-remapping attack. The most novel advantage of our FS attack is that Eve can get full information without introducing detectable QBER, which is more deceptive than the phase-remapping attack.
引用
收藏
页码:147 / 153
页数:7
相关论文
共 32 条
[1]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[2]   Quantum key distribution with classical Bob [J].
Boyer, Michel ;
Kenigsberg, Dan ;
Mor, Tal .
PHYSICAL REVIEW LETTERS, 2007, 99 (14)
[3]   QUANTUM NON-DEMOLITION MEASUREMENTS [J].
BRAGINSKY, VB ;
VORONTSOV, YI ;
THORNE, KS .
SCIENCE, 1980, 209 (4456) :547-557
[4]   Eavesdropping on the two-way quantum communication protocols with invisible photons [J].
Cai, QY .
PHYSICS LETTERS A, 2006, 351 (1-2) :23-25
[5]   Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate [J].
Chau, HF .
PHYSICAL REVIEW A, 2002, 66 (06) :4
[6]   Secure direct communication with a quantum one-time pad [J].
Deng, FG ;
Long, GL .
PHYSICAL REVIEW A, 2004, 69 (05) :052319-1
[7]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[8]   Phase-remapping attack in practical quantum-key-distribution systems [J].
Fung, Chi-Hang Fred ;
Qi, Bing ;
Tamaki, Kiyoshi ;
Lo, Hoi-Kwong .
PHYSICAL REVIEW A, 2007, 75 (03)
[9]   Trojan-horse attacks on quantum-key-distribution systems [J].
Gisin, N ;
Fasel, S ;
Kraus, B ;
Zbinden, H ;
Ribordy, G .
PHYSICAL REVIEW A, 2006, 73 (02)
[10]   Quantum key distribution over 122 km of standard telecom fiber [J].
Gobby, C ;
Yuan, ZL ;
Shields, AJ .
APPLIED PHYSICS LETTERS, 2004, 84 (19) :3762-3764