Countermeasure against probabilistic blinding attack in practical quantum key distribution systems
In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding a...
Saved in:
Published in | Chinese physics B Vol. 24; no. 9; pp. 111 - 115 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
01.09.2015
|
Subjects | |
Online Access | Get full text |
ISSN | 1674-1056 2058-3834 1741-4199 |
DOI | 10.1088/1674-1056/24/9/090305 |
Cover
Abstract | In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate(QBER) introduced by Eve, by which Eve can acquire information without the countermeasure. |
---|---|
AbstractList | In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate(QBER) introduced by Eve, by which Eve can acquire information without the countermeasure. In a practical quantum key distribution (QKD) system, imperfect equipment, especially the single-photon detector, can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate (QBER) introduced by Eve, by which Eve can acquire information without the countermeasure. |
Author | 钱泳君 李宏伟 何德勇 银振强 张春梅 陈巍 王双 韩正甫 |
AuthorAffiliation | Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026, China Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei 230026, China zhengzhou Information Science and Technology Institute, Zhengzhou 450004, China |
Author_xml | – sequence: 1 fullname: 钱泳君 李宏伟 何德勇 银振强 张春梅 陈巍 王双 韩正甫 |
BookMark | eNqFkLtOwzAUQC1UJNrCJyBZTCyhfsR2LCZU8ZIqscBs2Y5TTBOntZ2hf0-qVh1YWK6He451dWZgEvrgALjF6AGjqlpgLsoCI8YXpFzIBZKIInYBpgSxqqAVLSdgemauwCylH4Q4RoROgVn2Q8gudk6nITqo19qHlOE29kYb3_qUvYWm9aH2YQ11ztpuoA8joO240i3cDTrkoYMbt4f1yEdvhuz7ANM-Zdela3DZ6Da5m9M7B18vz5_Lt2L18fq-fFoVlmKai6bBNTOEl85URFJnLBMCC6YlQmXJHGFEyMZVzkiJLRIcWS1rQWtCGKtKRufg_vjvePtucCmrzifr2lYH1w9JYSEpIXwcI_p4RG3sU4quUdZnfTg6R-1bhZE6lFWHaupQTZFSSXUsO9rsj72NvtNx_693d_K--7DejT3PIues4oIhQX8Ba9uLTQ |
CitedBy_id | crossref_primary_10_1007_s11128_018_2013_8 crossref_primary_10_1088_1674_1056_ac8730 crossref_primary_10_1103_PhysRevApplied_22_044076 crossref_primary_10_1007_s11128_022_03487_9 crossref_primary_10_1140_epjqt_s40507_023_00178_x crossref_primary_10_1038_srep16200 crossref_primary_10_1103_PhysRevA_102_022605 |
Cites_doi | 10.1088/1367-2630/4/1/344 10.1140/epjd/e2007-00010-4 10.1103/PhysRevA.51.1863 10.1063/1.3597221 10.1364/OE.18.027938 10.1103/PhysRevLett.108.130503 10.1007/s11434-013-6037-2 10.1103/PhysRevLett.111.130502 10.1103/PhysRevLett.91.057901 10.1103/PhysRevLett.111.130501 10.1038/nphys629 10.1038/nphoton.2010.214 10.1103/PhysRevLett.85.441 10.1103/PhysRevA.84.062308 10.1088/1367-2630/11/6/065003 10.1103/RevModPhys.81.1301 10.1038/nphoton.2010.269 10.1080/09500340410001730986 10.26421/QIC7.1-2-3 10.26421/QIC4.5-1 10.1364/OE.19.023590 10.1007/s11433-014-5557-3 10.1103/PhysRevA.75.032314 10.1126/science.283.5410.2050 10.1103/PhysRevA.78.042333 10.1103/PhysRevLett.67.661 10.1063/1.3425737 |
ContentType | Journal Article |
DBID | 2RA 92L CQIGP ~WA AAYXX CITATION 7U5 8FD H8D L7M |
DOI | 10.1088/1674-1056/24/9/090305 |
DatabaseName | 维普_期刊 中文科技期刊数据库-CALIS站点 中文科技期刊数据库-7.0平台 中文科技期刊数据库- 镜像站点 CrossRef Solid State and Superconductivity Abstracts Technology Research Database Aerospace Database Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef Aerospace Database Solid State and Superconductivity Abstracts Technology Research Database Advanced Technologies Database with Aerospace |
DatabaseTitleList | Aerospace Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Physics |
DocumentTitleAlternate | Countermeasure against probabilistic blinding attack in practical quantum key distribution systems |
EISSN | 2058-3834 1741-4199 |
EndPage | 115 |
ExternalDocumentID | 10_1088_1674_1056_24_9_090305 665867507 |
GroupedDBID | 02O 1JI 1WK 29B 2RA 4.4 5B3 5GY 5VR 5VS 5ZH 6J9 7.M 7.Q 92L AAGCD AAJIO AAJKP AALHV AATNI ABHWH ABJNI ABQJV ACAFW ACGFS ACHIP AEFHF AENEX AFUIB AFYNE AHSEE AKPSB ALMA_UNASSIGNED_HOLDINGS ASPBG ATQHT AVWKF AZFZN BBWZM CCEZO CCVFK CEBXE CHBEP CJUJL CQIGP CRLBU CS3 DU5 EBS EDWGO EJD EMSAF EPQRW EQZZN FA0 FEDTE HAK HVGLF IJHAN IOP IZVLO JCGBZ KNG KOT M45 N5L NT- NT. PJBAE Q02 RIN RNS ROL RPA RW3 SY9 TCJ TGP UCJ W28 ~WA -SA -S~ AAYXX ACARI ADEQX AERVB AGQPQ AOAED ARNYC CAJEA CITATION Q-- U1G U5K 7U5 8FD AEINN H8D L7M |
ID | FETCH-LOGICAL-c313t-ff1d5b264eb8293ebc577175a900445e25279fe8eb991c0760ca9d73d22558453 |
ISSN | 1674-1056 |
IngestDate | Thu Sep 04 23:57:21 EDT 2025 Tue Jul 01 02:55:11 EDT 2025 Thu Apr 24 22:54:23 EDT 2025 Wed Feb 14 10:28:07 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 9 |
Language | English |
License | http://iopscience.iop.org/info/page/text-and-data-mining http://iopscience.iop.org/page/copyright |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c313t-ff1d5b264eb8293ebc577175a900445e25279fe8eb991c0760ca9d73d22558453 |
Notes | countermeasure bound,single-photon detector,probabilistic blinding attack,quantum key distribution In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate(QBER) introduced by Eve, by which Eve can acquire information without the countermeasure. 11-5639/O4 ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
PQID | 1793226932 |
PQPubID | 23500 |
PageCount | 5 |
ParticipantIDs | proquest_miscellaneous_1793226932 crossref_citationtrail_10_1088_1674_1056_24_9_090305 crossref_primary_10_1088_1674_1056_24_9_090305 chongqing_primary_665867507 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2015-09-01 |
PublicationDateYYYYMMDD | 2015-09-01 |
PublicationDate_xml | – month: 09 year: 2015 text: 2015-09-01 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | Chinese physics B |
PublicationTitleAlternate | Chinese Physics |
PublicationYear | 2015 |
References | Qi B (16) 2007; 7 22 Gottesman D (6) 2004; 4 24 25 26 27 28 29 Bennet C H (1) 1984 Makarov V (23) 2009; 11 Wang Y (11) 2014; 23 30 31 10 12 14 17 18 19 Xu F (15) 2010; 12 Li F Y (20) 2014; 31 2 Lütkenhaus N (13) 2002; 4 3 4 5 7 8 9 21 |
References_xml | – volume: 4 start-page: 44 issn: 1367-2630 year: 2002 ident: 13 publication-title: New J. Phys. doi: 10.1088/1367-2630/4/1/344 – ident: 7 doi: 10.1140/epjd/e2007-00010-4 – ident: 12 doi: 10.1103/PhysRevA.51.1863 – ident: 29 doi: 10.1063/1.3597221 – ident: 26 doi: 10.1364/OE.18.027938 – ident: 19 doi: 10.1103/PhysRevLett.108.130503 – ident: 8 doi: 10.1007/s11434-013-6037-2 – ident: 22 doi: 10.1103/PhysRevLett.111.130502 – ident: 30 doi: 10.1103/PhysRevLett.91.057901 – ident: 21 doi: 10.1103/PhysRevLett.111.130501 – ident: 31 doi: 10.1038/nphys629 – ident: 24 doi: 10.1038/nphoton.2010.214 – ident: 4 doi: 10.1103/PhysRevLett.85.441 – ident: 18 doi: 10.1103/PhysRevA.84.062308 – volume: 11 issn: 1367-2630 year: 2009 ident: 23 publication-title: New J. Phys. doi: 10.1088/1367-2630/11/6/065003 – year: 1984 ident: 1 publication-title: Processings of IEEE International Conference on Computers, Systems and Singnal Processing – ident: 9 doi: 10.1103/RevModPhys.81.1301 – ident: 28 doi: 10.1038/nphoton.2010.269 – ident: 10 doi: 10.1080/09500340410001730986 – volume: 7 start-page: 73 issn: 1533-7146 year: 2007 ident: 16 publication-title: Quant. Inf. Comput. doi: 10.26421/QIC7.1-2-3 – volume: 31 issn: 0256-307X year: 2014 ident: 20 publication-title: Chin. Phys. Lett. – volume: 4 start-page: 325 issn: 1533-7146 year: 2004 ident: 6 publication-title: Quantum Inf. Comput. doi: 10.26421/QIC4.5-1 – volume: 23 issn: 1674-1056 year: 2014 ident: 11 publication-title: Chin. Phys. B – ident: 27 doi: 10.1364/OE.19.023590 – volume: 12 issn: 1367-2630 year: 2010 ident: 15 publication-title: New J. Phys. – ident: 5 doi: 10.1007/s11433-014-5557-3 – ident: 14 doi: 10.1103/PhysRevA.75.032314 – ident: 3 doi: 10.1126/science.283.5410.2050 – ident: 17 doi: 10.1103/PhysRevA.78.042333 – ident: 2 doi: 10.1103/PhysRevLett.67.661 – ident: 25 doi: 10.1063/1.3425737 |
SSID | ssj0061023 ssib054405859 ssib000804704 |
Score | 2.0605438 |
Snippet | In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack.... In a practical quantum key distribution (QKD) system, imperfect equipment, especially the single-photon detector, can be eavesdropped on by a blinding attack.... |
SourceID | proquest crossref chongqing |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 111 |
SubjectTerms | Bit error rate Computer information security Countermeasures Detectors Mathematical models Probabilistic methods Probability theory Quantum cryptography 分配系统 单光子探测器 攻击模型 比特错误率 直接检测 约束问题 量子密钥分配 随机 |
Title | Countermeasure against probabilistic blinding attack in practical quantum key distribution systems |
URI | http://lib.cqvip.com/qk/85823A/201509/665867507.html https://www.proquest.com/docview/1793226932 |
Volume | 24 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NaxQxFA9rRfBSrB-4rZUI3pZ05yMzkxxFKm0PWqHF6iUkM9nt0jprnRkQ_3rfm0xmZ6So9RKWMHkLeb-8vO8Q8lpzGUhjC6ZllDAOR5tJXqRgpSzAZBYmiHSbIPs-PTrnJxfJxWTyY5C11NTmIP95a13J_3AV5oCvWCV7B872RGECfgN_YQQOw_hPPMaCchStzs8300sw86sac65M2zgXezDPzPXKVa7outb5VZs27kqjgDs3Dexs83UGRxljNf3zV12H52qou-JT27aynTOk2rzX_HHlvKif1-WSnTSbJB_3IjbOfrKrjdfVyTmGn_dCx7Uy-HJpS4bklkNvRJj06VZegKYZB9HumoV7CeuqpDskyYG4lChubhXkIPzQp-CpYd0Kx2SONtjkV43bZ_92rfXJhm2YXQiFxBQSUxFXUjky98j9KMvaAP_xh1N_h6fY0AJNdf__vvZLiHk_N4_4XM4dGezMcQm7dgPsHGs44wu-1VrOHpHtztygbxx2dsjElo_Jg1PHwSfEjBFEOwTREYKoRxB1CKKrkvYIoh2CKCCIDhFEOwQ9JefvDs_eHrHu1Q2Wx2Fcs8UiLBIDerI1AnRBa_IENihLtMTgf2KjJMrkwgprwLTIMbCba1lkcQE3A2izSfyMbJXr0j4nNBSBjlsTpIC7QsICbuJc52lqAiOEmJK9ftfUN9ddRaWgE4MVG2RTwv0-qrxrWI_vplyrP3J0Sg76ZZ7mXxa88kxSIFsxYKZLu24qhZcXmCcw7N6V6B556I5HzEL5gmzV3xu7D-prbV62SPsF_IKTyQ |
linkProvider | IOP Publishing |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Countermeasure+against+probabilistic+blinding+attack+in+practical+quantum+key+distribution+systems&rft.jtitle=Chinese+physics+B&rft.au=Qian%2C+Yong-Jun&rft.au=Li%2C+Hong-Wei&rft.au=He%2C+De-Yong&rft.au=Yin%2C+Zhen-Qiang&rft.date=2015-09-01&rft.issn=1674-1056&rft.volume=24&rft.issue=9&rft.spage=90305&rft_id=info:doi/10.1088%2F1674-1056%2F24%2F9%2F090305&rft.externalDBID=n%2Fa&rft.externalDocID=10_1088_1674_1056_24_9_090305 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F85823A%2F85823A.jpg |