Faked states attack on quantum cryptosystems

被引:175
作者
Makarov, V [1 ]
Hjelme, DR [1 ]
机构
[1] Norwegian Univ Sci & Technol, Dept Elect & Telecommun, NO-7491 Trondheim, Norway
关键词
D O I
10.1080/09500340410001730986
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
A new type of attack on quantum cryptography systems is proposed. In this attack, Eve utilizes various optical imperfections in Bob's scheme and constructs light pulses so that Bob does not distinguish his detection results from normal, whereas they give Bob the basis and bit value chosen at Eve's discretion. Applying this attack to systems with passive basis choice on Bob's side is considered. Also, a general workflow of breaking into a running quantum cryptolink using this or Trojan horse attack is discussed.
引用
收藏
页码:691 / 705
页数:15
相关论文
共 12 条
[1]  
*CORN INC, 1999, CORN SMF 28 CPC6 SIN
[2]   Quantum cryptography [J].
Gisin, N ;
Ribordy, GG ;
Tittel, W ;
Zbinden, H .
REVIEWS OF MODERN PHYSICS, 2002, 74 (01) :145-195
[3]  
GOTTESMAN D, 2002, QUANTPH0212066
[4]  
INAMORI H, 2001, QUANTPH0107017
[5]  
Kurtsiefer C, 2001, J MOD OPTIC, V48, P2039, DOI 10.1080/09500340110070235
[6]  
Larsson JÅ, 2002, QUANTUM INF COMPUT, V2, P434
[7]   Estimates for practical quantum cryptography [J].
Lütkenhaus, N .
PHYSICAL REVIEW A, 1999, 59 (05) :3301-3319
[8]  
*MELL GRIOT INC, 1999, MELL GRIOT PROD CAT
[9]   Long-distance entanglement-based quantum key distribution [J].
Ribordy, Greágoire ;
Brendel, Jürgen ;
Gautier, Jean-Daniel ;
Gisin, Nicolas ;
Zbinden, Hugo .
2001, American Inst of Physics, Woodbury (63)
[10]  
SINGH S, 2000, CODE BOOK