首页> 外文OA文献 >Quantum hacking: saturation attack on practical continuous-variable quantum key distribution
【2h】

Quantum hacking: saturation attack on practical continuous-variable quantum key distribution

机译:量子黑客攻击:对实际连续变量的饱和攻击   量子密钥分配

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

We identify and study a new security loophole in continuous-variable quantumkey distribution (CV-QKD) implementations, related to the imperfect linearityof the homodyne detector. By exploiting this loophole, we propose an activeside-channel attack on the Gaussian-modulated coherent state CV-QKD protocolcombining an intercept-resend attack with an induced saturation of the homodynedetection on the receiver side (Bob). We show that an attacker can bias theexcess noise estimation by displacing the quadratures of the coherent statesreceived by Bob. We propose a saturation model that matches experimentalmeasurements on the homodyne detection and use this model to study the impactof the saturation attack on parameter estimation in CV-QKD.We demonstrate thatthis attack can bias the excess noise estimation beyond the null key thresholdfor any system parameter, thus leading to a full security break. If we consideran additional criteria imposing that the channel transmission estimation shouldnot be affected by the attack, then the saturation attack can only be launchedif the attenuation on the quantum channel is sufficient, corresponding toattenuations larger than approximately 6 dB. We moreover discuss the possiblecounter-measures against the saturation attack and propose a new counter-measure based on Gaussian post-selection that can be implemented by classicalpost-processing and may allow to distill secret key when the raw measurementdata is partly saturated.
机译:我们在连续变量量子密钥分配(CV-QKD)实现中发现并研究了一个新的安全漏洞,该漏洞与零差探测器的线性不完全有关。通过利用此漏洞,我们提出了对高斯调制相干态CV-QKD协议的主动边信道攻击,并将拦截重发攻击与接收方(Bob)的零差检测的饱和结合在一起。我们表明,攻击者可以通过移动Bob接收的相干态的正交来使多余的噪声估计偏倚。我们提出了一个与零差检测实验值相匹配的饱和度模型,并使用该模型研究了CV-QKD中饱和度攻击对参数估计的影响。我们证明了这种攻击可以使多余的噪声估计超出任何系统参数的空关键阈值,从而导致完全的安全破坏。如果我们考虑一个附加标准,即信道传输估计不应该受到攻击的影响,那么只有在量子信道上的衰减足够大时(相当于大于大约6 dB的衰减),才能启动饱和攻击。此外,我们讨论了针对饱和攻击的可能对策,并提出了一种基于高斯后选择的新对策,该对策可以通过经典后处理来实现,并且可以在原始测量数据部分饱和时提取密钥。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号