# Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch

@article{Sajeed2015SecurityLI, title={Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch}, author={Shihan Sajeed and Poompong Chaiwongkhot and Jean-Philippe Bourgoin and Thomas Jennewein and Norbert Lutkenhaus and Vadim Makarov}, journal={Physical Review A}, year={2015}, volume={91}, pages={062301} }

In free-space quantum key distribution (QKD), the sensitivity of the receiver's detector channels may depend differently on the spatial mode of incoming photons. Consequently, an attacker can control the spatial mode to break security. We experimentally investigate a standard polarization QKD receiver and identify sources of efficiency mismatch in its optical scheme. We model a practical intercept-and-resend attack and show that it would break security in most situations. We show experimentally…

## 64 Citations

### Security of quantum key distribution with detection-efficiency mismatch in the multiphoton case

- Computer Science, MathematicsQuantum
- 2022

This work presents a rigorous security proof without these assumptions of QKD with detection-efficiency mismatch against general attacks (in the asymptotic regime) and adapts the decoy state method to the case of detection- efficiency mismatch.

### Secure detection in quantum key distribution by real-time calibration of receiver

- Computer Science, Physics
- 2016

A method is presented for estimating the detection efficiency of the detector unit, and the corresponding secure key generation rate, which gives a secure rate for any detector with non-unity single-photon detection efficiency.

### Security proof of practical quantum key distribution with detection-efficiency mismatch

- Computer Science
- 2020

The method applies to a variety of coding mechanisms, including time-bin encoding, and also allows for general manipulations of the spatial-temporal modes by the adversary, which can close the long-standing question how to provide a valid, complete security proof of a QKD setup with characterized efficiency mismatch.

### Security of quantum key distribution with detection-efficiency mismatch in the single-photon case: Tight bounds

- Computer SciencePhysical Review A
- 2019

A method based on the analytical minimization of the relative entropy of coherence, which can be used in other problems in quantum key distribution, is proposed and an adaptation of the decoy state method to proof the security in the case of weak coherent pulses on the source side is proposed.

### Eavesdropping and countermeasures for backflash side channel in quantum cryptography.

- PhysicsOptics express
- 2018

This work experimentally demonstrates on a free-space QKD receiver that an eavesdropper can distinguish which detector has clicked inside it, and thus acquire secret information, and a set of countermeasures both in theory and on the physical devices are discussed.

### A Review of Security Evaluation of Practical Quantum Key Distribution System

- Computer ScienceEntropy
- 2022

The development of quantum hacking and security evaluation technology for a practical decoy state BB84 QKD system is reviewed, the security requirement and parameters in each module (source, encoder, decoder and detector) are discussed, and the relationship between quantum hacked and security parameter are shown.

### Homodyne-detector-blinding attack in continuous-variable quantum key distribution

- Computer SciencePhysical Review A
- 2018

It is shown that under certain conditions, an attacker can use a simple laser, incoherent with the homodyne receiver, to generate bright pulses and bias the excess noise to arbitrary small values, fully comprising CV QKD security.

### Detection Efficiency Mismatch and Finite-Key-Size Attacks on Practical Quantum Cryptography Systems

- Computer Science
- 2016

This thesis presents three experimental studies of attacks on quantum key distribution (QKD) systems, including a demonstration of Eve’s ability to force a commercial system to distill a key from a raw key of a short length, where the asymptotic assumption of security claimed by the manufacturer might not hold.

### Randomized Ancillary Qubit Overcomes Detector-Control and Intercept-Resend Hacking of Quantum Key Distribution

- PhysicsJournal of Lightwave Technology
- 2022

Practical implementations of quantum key distribution (QKD) have been shown to be subject to various detector side-channel attacks that compromise the promised unconditional security. Most notable is…

### Laser-Damage Attack Against Optical Attenuators in Quantum Key Distribution

- PhysicsPhysical Review Applied
- 2020

Many quantum key distribution systems employ a laser followed by an optical attenuator to prepare weak coherent states in the source. Their mean photon number must be pre-calibrated to guarantee the…

## References

SHOWING 1-8 OF 8 REFERENCES

### in Proceedings of IEEE International Conference on Computers

- Systems, and Signal Processing
- 1984

### Quantum Info

- Comput. 9, 131
- 2009

### Comput

- Mach. 48, 351
- 2001

### Fortschr

- Phys. 54, 840
- 2006

### Nature (London) 419

- 450
- 2002

### Science 283

- 2050
- 1999

### New J

- Phys. 13, 073024
- 2011