Perceiving Quantum Hacking for Quantum Key Distribution Using Temporal Ghost Imaging
نویسندگان
چکیده
Quantum key distribution (QKD) can generate secure bits between remote users with quantum mechanics. However, the gap theoretical model and practical realizations gives eavesdroppers opportunities to intercept secret key. The most insidious attacks, known as hacking, are ones no significant discrepancy of measurement results using side-channel loopholes QKD systems. Depicting full-time-scale characteristics signals, channel, system provide legitimate extra capabilities defeat malicious attacks. For first time, we propose method exploring temporal ghost imaging (TGI) scheme perceive hacking fingerprints experimentally verify its validity. presents a common approach promote QKD's security from new perspective signals
منابع مشابه
Quantum key distribution using quantum Faraday rotators.
We propose a new quantum key distribution (QKD) protocol based on the fully quantum mechanical states of Faraday rotators. The protocol is unconditionally secure against collective attacks for a multi-photon source of up to two photons on a noisy environment. It is also robust against impersonation attacks. The protocol may be implemented experimentally with the current spintronics technology o...
متن کاملLong-distance temporal quantum ghost imaging over optical fibers
Since the first quantum ghost imaging (QGI) experiment in 1995, many QGI schemes have been put forward. However, the position-position or momentum-momentum correlation required in these QGI schemes cannot be distributed over optical fibers, which limits their large-scale geographical applications. In this paper, we propose and demonstrate a scheme for long-distance QGI utilizing frequency corre...
متن کاملHacking the Bell test using classical light in energy-time entanglement–based quantum key distribution
Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standa...
متن کاملQuantum Three-Pass protocol: Key distribution using quantum superposition states
This letter proposes a novel key distribution protocol with no key exchange in advance, which is secure as the BB84 quantum key distribution protocol. Our protocol utilizes a photon in superposition state for single-bit data transmission instead of a classical electrical/optical signal. The security of this protocol relies on the fact, that the arbitrary quantum state cannot be cloned, known as...
متن کاملQuantum Key Distribution using Entanglement Swapping
Cryptography has been one of the most fruitful applications coming out of quantum information theory and it appears to be practically implementible in the nearest future among quantum technology [1]. A number of cryptographic key distribution protocols based on quantum mechanics have been proposed. Bennett and Brassard [2] were the first to propose a quantum based key distribution (called BB84)...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical review applied
سال: 2021
ISSN: ['2331-7043', '2331-7019']
DOI: https://doi.org/10.1103/physrevapplied.15.034051