Phase-Remapping Attack in Practical Quantum Key Distribution Systems

@article{Fung2006PhaseRemappingAI,
  title={Phase-Remapping Attack in Practical Quantum Key Distribution Systems},
  author={Chi-Hang Fred Fung and Bing Qi and Kiyoshi Tamaki and Hoi-Kwong Lo},
  journal={ArXiv},
  year={2006},
  volume={abs/quant-ph/0601115}
}
  • C. Fung, B. Qi, +1 author H. Lo
  • Published 17 January 2006
  • Physics, Computer Science, Mathematics
  • ArXiv
Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the… Expand
Quantum hacking: attacking practical quantum key distribution systems
  • B. Qi, C. Fung, +4 authors H. Lo
  • Physics, Engineering
  • SPIE Optical Engineering + Applications
  • 2007
Quantum key distribution (QKD) can, in principle, provide unconditional security based on the fundamental laws of physics. Unfortunately, a practical QKD system may contain overlooked imperfectionsExpand
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
Quantum key distribution (QKD) can, in principle, provide unconditional security based on the fundamental laws of physics. Unfortunately, a practical QKD system may contain overlooked imperfectionsExpand
Quantum Flows for Secret Key Distribution
TLDR
A new theoretical approach called quantum flows is proposed to be able to detect the eavesdropping activity in the channel without requiring additional optical components different from the BB84 protocol because the system can be implemented as a high software module. Expand
Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack
TLDR
The negative acknowledgment state quantum key distribution protocol is proposed as a novel protocol capable of detecting the eavesdropping activity of the Intercept Resend with Faked Sates attack without requiring additional optical components different from the B B 84 protocol because the system can be implemented as a high software module. Expand
Security of QKD-systems with detector efficiency mismatch
The rules of quantum mechanics makes it possible to exchange a secret key at a distance. This is called quantum key distribution (QKD). In theory the key exchange can be made completely secure. RealExpand
Quantum man-in-the-middle attack on the calibration process of quantum key distribution
TLDR
This paper reveals the security risk of the calibration process of a passive-basis-choice BB84 QKD system by launching a quantum man-in-the-middle attack which intercepts all calibration signals and resends faked ones, and proposes a basis-dependent detector efficiency mismatch (BEM) based faked states attack on a single photon BB84QKD to stress the threat of BEM. Expand
Decoy-state quantum key distribution with a leaky source
TLDR
This work proves the security of optical QKD systems using phase and intensity modulators in their transmitters, which leak the setting information in an arbitrary manner, and applies the security proof to cases of practical interest and shows key rates similar to those obtained in a perfectly shielded environment. Expand
Measurement-device-independent semiquantum key distribution
TLDR
This paper designs a measurement-device-independent SQKD protocol, which can remove the threat of all detector side-channel attacks and show that it is also robust, and discusses the possible use of the proposed protocol in real-world applications and in QKD networks. Expand
Practical decoy state quantum key distribution with detector efficiency mismatch
TLDR
A general theory of the decoy state QKD with DEM is proposed to calculate the lower bound of count rate and the upper bound of error rate of single photon state signals, and the numerical simulations show that secure key can also be generated, but the existing of DEM will reduce the secure key of practical decoyStateQKD systems. Expand
Memory-assisted measurement-device-independent quantum key distribution systems
TLDR
This thesis focuses on improving the key rate performance of secure communications by introducing imperfect quantum memories (QMs) in a measurement-device-independent (MDI) QKD system, and proposes an alternative approach to the memory-assisted MDI-QKD by employing entangled-photon sources. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 92 REFERENCES
Time-shift attack in practical quantum cryptosystems
TLDR
This paper proposes another "time-shift" attack that exploits the efficiency mismatch of two single photon detectors in a quantum key distribution (QKD) system and proves that if Alice and Bob are unaware of the attack, the final key they share is insecure. Expand
Proof of security of quantum key distribution with two-way classical communications
TLDR
This investigation suggests that two-way entanglement purification is a useful tool in the study of advantage distillation, error correction, and privacy amplification protocols. Expand
Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate
A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established onlyExpand
Unconditional security of practical quantum key distribution
TLDR
This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001, therefore, some of the more recent developments, including the question of composability, are not addressed. Expand
Quantum Cryptography
TLDR
A remarkable surge of interest in the international scientific and industrial community has propelled quantum cryptography into mainstream computer science and physics and it is becoming increasingly practical at a fast pace. Expand
Security of quantum key distribution with imperfect devices
This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proofExpand
Effects of detector efficiency mismatch on security of quantum cryptosystems
We suggest a type of attack on quantum cryptosystems that exploits variations in detector efficiency as a function of a control parameter accessible to an eavesdropper. With gated single-photonExpand
Trojan-horse attacks on quantum-key-distribution systems (6 pages)
General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today'sExpand
Unconditional security of quantum key distribution over arbitrarily long distances
  • Lo, Châu
  • Computer Science, Medicine
  • Science
  • 1999
TLDR
The problem is solved by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance of a realistic noisy channel can be made unconditionally secure. Expand
Entanglement as a precondition for secure quantum key distribution.
We demonstrate that a necessary precondition for an unconditionally secure quantum key distribution is that both sender and receiver can use the available measurement results to prove the presence ofExpand
...
1
2
3
4
5
...