Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution
نویسندگان
چکیده
Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. We reach Bell values up to 3.63 at 97.6% faked detector efficiency using tailored pulses of classical light, which exceeds even the quantum prediction. This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for energy-time entanglement setups based on Franson's configuration. However, device-independent security can be reestablished, and we conclude by listing a number of improved tests and experimental setups that would protect against all current and future attacks of this type.
منابع مشابه
Entanglement-based quantum key distribution without an entangled-photon source
Quantum key distribution ~QKD! has been studied extensively as a means to realize unconditionally secure communication systems. Two legal parties ~Alice and Bob! create a secret key, security of which against eavesdropping is guaranteed by the law of quantum mechanics, and use it as a one-time pad for encrypting messages. Following the first proposal that used four nonorthogonal states @Benneet...
متن کاملCoherent state quantum key distribution based on entanglement sudden death
A method for quantum key distribution (QKD) using entangled coherent states is discussed which is designed to provide key distribution rates and transmission distances surpassing those of traditional entangled photon pair QKD by exploiting entanglement sudden death. The method uses entangled electromagnetic signal states of ‘macroscopic’ average photon numbers rather than single photon or entan...
متن کاملQuantum Computing, Computer Engineering, Information Theory, Entanglement Detecting Violation of Bell Inequalities using LOCC Maximized Quantum Fisher Information and Entanglement Measures
The violation of Bell's theorem is a very simple way to see that there is no underlying classical interpretation of quantum mechanics. The measurements made on the photons shows that light signal (information) could travel between them, hence completely eliminating any chance that the result was due to anything other than entanglement. Entanglement has been studied extensively for understanding...
متن کاملA random quantum key distribution by using Bell states
We proposed a new scheme for quantum key distribution based on entanglement swapping. By this protocol Alice can securely share a random quantum key with Bob, without transporting any particle.
متن کاملDaylight operation of a free space, entanglement-based quantum key distribution system
Many quantum key distribution (QKD) implementations using a free space transmission path are restricted to operation at night time in order to distinguish the signal photons used for a secure key establishment from background light. Here, we present a lean entanglement-based QKD system overcoming that limitation. By implementing spectral, spatial and temporal filtering techniques, we were able ...
متن کامل