...
首页> 外文期刊>Physical Review, A. Atomic, molecular, and optical physics >Phase-remapping attack in practical quantum-key-distribution systems
【24h】

Phase-remapping attack in practical quantum-key-distribution systems

机译:实用量子密钥分配系统中的相位重映射攻击

获取原文
获取原文并翻译 | 示例
           

摘要

Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the "plug-and-play" system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.
机译:量子密钥分发(QKD)可用于在两个远方之间生成密钥。即使已证明QKD具有无限制的计算能力,可以无条件地防止窃听,但是QKD的实际实现可能包含漏洞,可能会导致所生成的秘密密钥被泄露。在本文中,我们提出了一种针对两个实用的双向QKD系统(即插即用系统和Sagnac系统)的相位重映射攻击。我们表明,如果系统的用户不了解我们的攻击,则在某些情况下可能会损害它们之间共享的最终密钥。具体来说,我们表明,在具有理想单光子源的Bennett-Brassard 1984(BB84)协议的情况下,当量子误码率(QBER)在14.6%和20%之间时,我们的攻击使最后的密钥不安全,而如果两个用户都不知道我们的攻击,则证明相同范围的QBER值是安全的;同样,我们用现实的设备演示了三种情况,其中无需考虑特洛伊木马攻击即可获得正密钥率,但实际上无法提取密钥。我们指出,仅使用当前技术进行攻击是可行的。因此,了解我们的攻击以确保绝对安全非常重要。在发现攻击时,我们将一般POVM描述的单个测量的QBER最小化,这与标准的量子态判别问题有些相似。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号