Faking photon number on a transition-edge sensor

被引:0
作者
Poompong Chaiwongkhot
Jiaqiang Zhong
Anqi Huang
Hao Qin
Sheng-cai Shi
Vadim Makarov
机构
[1] University of Waterloo,Institute for Quantum Computing
[2] University of Waterloo,Department of Physics and Astronomy
[3] Mahidol University,Department of Physics, Faculty of Science
[4] Quantum Technology Foundation (Thailand),Purple Mountain Observatory and Key Laboratory of Radio Astronomy
[5] Chinese Academy of Sciences,Institute for Quantum Information & State Key Laboratory of High Performance Computing, College of Computer Science and Technology
[6] National University of Defense Technology,Centre for Quantum Technologies
[7] National University of Singapore,Shanghai Branch, National Laboratory for Physical Sciences at Microscale and CAS Center for Excellence in Quantum Information
[8] Russian Quantum Center,NTI Center for Quantum Communications
[9] University of Science and Technology of China,undefined
[10] National University of Science and Technology MISiS,undefined
来源
EPJ Quantum Technology | 2022年 / 9卷
关键词
D O I
暂无
中图分类号
学科分类号
摘要
We study potential security vulnerabilities of a single-photon detector based on superconducting transition-edge sensor. In one experiment, we show that an adversary could fake a photon number result at a certain wavelength by sending a larger number of photons at a longer wavelength, which is an expected and known behaviour. In another experiment, we unexpectedly find that the detector can be blinded by bright continuous-wave light and then, a controlled response simulating single-photon detection can be produced by applying a bright light pulse. We model an intercept-and-resend attack on a quantum key distribution system that exploits the latter vulnerability and, under certain assumptions, able to steal the key.
引用
收藏
相关论文
共 218 条
[1]  
Hadfield RH(2009)Single-photon detectors for optical quantum information applications Nat Photonics 3 696-705
[2]  
Makarov V(2006)Effects of detector efficiency mismatch on security of quantum cryptosystems Phys Rev A 74 686-689
[3]  
Anisimov A(2008)Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems Phys Rev A 78 60-76
[4]  
Skaar J(2010)Hacking commercial quantum cryptography systems by tailored bright illumination Nat Photonics 4 27938-27954
[5]  
Zhao Y(2010)Security of quantum key distribution with bit and basis dependent detector flaws Quantum Inf Comput 10 680-685
[6]  
Fung C-HF(2010)Thermal blinding of gated detectors in quantum cryptography Opt Express 18 6734-6748
[7]  
Qi B(2011)Tailored bright illumination attack on distributed-phase-reference protocols J Mod Opt 58 30979-30988
[8]  
Chen C(2011)Full-field implementation of a perfect eavesdropper on a quantum cryptography system Nat Commun 2 1178-1184
[9]  
Lo H-K(2016)Testing random-detector-efficiency countermeasure in a commercial system reveals a breakable unrealistic assumption IEEE J Quantum Electron 52 27-33
[10]  
Lydersen L(2018)Hacking the quantum key distribution system by exploiting the avalanche-transition region of single-photon detectors Phys Rev Appl 10 1228-1235