Saturation Attack on Continuous-Variable Quantum Key Distribution System
نویسندگان
چکیده
Introduction Quantum key distribution (QKD) [1] enables two remote parties Alice and Bob to share common secure keys which are unknown to a potential eavesdropper. Unconditional security of QKD is based on the fundamental laws of quantum mechanics, but in reality, securities of practical QKD systems could be jeopardized by physical implementations. In discretevariable (DV) QKD system, due to devices imperfections, various quantum hacking strategies have been proposed and some of them are demonstrated in experiments [2–4]. Most of the practical attacks that have been demonstrated up to now are targeting the detection part of the QKD systems. Continuous-variable (CV) QKD, as another approach, is proven secure against collective attacks and recent works have shown progress in proving its security against arbitrary attacks [5]. However, practical CV QKD systems also face the security problems linked to imperfect implementations. The validity of security proofs relies on assumptions that may be violated in practical setup, opening loopholes that may be exploited by Eve to mount attacks. For example direct [6] or indirect [7] manipulation of local oscillator (LO) intensity can fully compromise the security. This imposes to monitor LO intensity and to use filters to forbid wavelength-dependent LO intensity manipulations. In this work, we have identified a new loophole and shown that it can be used to attack a practical CV QKD system implementing Gaussian-modulated coherent state (GMCS) protocol [8]. Instead of attacking LO, we aim at the homodyne detection located on Bob side, specifically, the electronics of the homodyne detection. We propose an attack consisting in a full interceptresend attack [9] combined with the exploitation of the nonlinear response of homodyne detection, namely saturation attack. Under this saturation attack, we can show that Eve can manipulate the measurement results on Bob’s side and get information without being discovered. Importantly, our attack is practical that can be realistically launched against existing implementations.
منابع مشابه
Single-quadrature continuous-variable quantum key distribution
Most continuous-variable quantum key distribution schemes are based on the Gaussian modulation of coherent states followed by continuous quadrature detection using homodyne detectors. In all previous schemes, the Gaussian modulation has been carried out in conjugate quadratures thus requiring two independent modulators for their implementations. Here, we propose and experimentally test a largel...
متن کاملOn Secure Quantum Key Distribution Using Continuous Variables of Single Photons
We analyse the distribution of secure keys using quantum cryptography based on the continuous variable degree of freedom of entangled photon pairs. We derive the information capacity of a scheme based on the spatial entanglement of photons from a realistic source, and show that the standard measures of security known for quadrature-based continuous variable quantum cryptography (CVQKD) are inad...
متن کاملQuantum Key Distribution using Continuous-variable non-Gaussian States
In this work we present a quantum key distribution protocol using continuous-variable nonGaussian states, homodyne detection and post-selection. The employed signal states are the Photon Added then Subtracted Coherent States (PASCS) in which one photon is added and subsequently one photon is subtracted. We analyze the performance of our protocol, compared to a coherent state based protocol, for...
متن کاملLong Distance Continuous-Variable Quantum Key Distribution with a Gaussian Modulation
We designed high-efficiency error correcting codes allowing to extract an errorless secret key in a Continuous-Variable Quantum Key Distribution (CVQKD) protocol using a Gaussian modulation of coherent states and a homodyne detection. These codes are available for a wide range of signalto-noise ratios on an Additive White Gaussian Noise Channel (AWGNC) with a binary modulation and can be combin...
متن کاملSecurity of continuous-variable quantum key distribution: towards a de Finetti theorem for rotation symmetry in phase space
Proving the unconditional security of quantum key distribution (QKD) is a highly challenging task as one needs to determine the most efficient attack compatible with experimental data. This task is even more demanding for continuous-variable QKD as the Hilbert space where the protocol is described is infinite dimensional. A possible strategy to address this problem is to make an extensive use o...
متن کامل