Countermeasure against probabilistic blinding attack in practical quantum key distribution systems

In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding a...

Full description

Saved in:
Bibliographic Details
Published inChinese physics B Vol. 24; no. 9; pp. 111 - 115
Main Author 钱泳君 李宏伟 何德勇 银振强 张春梅 陈巍 王双 韩正甫
Format Journal Article
LanguageEnglish
Published 01.09.2015
Subjects
Online AccessGet full text
ISSN1674-1056
2058-3834
1741-4199
DOI10.1088/1674-1056/24/9/090305

Cover

Abstract In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate(QBER) introduced by Eve, by which Eve can acquire information without the countermeasure.
AbstractList In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate(QBER) introduced by Eve, by which Eve can acquire information without the countermeasure.
In a practical quantum key distribution (QKD) system, imperfect equipment, especially the single-photon detector, can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate (QBER) introduced by Eve, by which Eve can acquire information without the countermeasure.
Author 钱泳君 李宏伟 何德勇 银振强 张春梅 陈巍 王双 韩正甫
AuthorAffiliation Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026, China Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei 230026, China zhengzhou Information Science and Technology Institute, Zhengzhou 450004, China
Author_xml – sequence: 1
  fullname: 钱泳君 李宏伟 何德勇 银振强 张春梅 陈巍 王双 韩正甫
BookMark eNqFkLtOwzAUQC1UJNrCJyBZTCyhfsR2LCZU8ZIqscBs2Y5TTBOntZ2hf0-qVh1YWK6He451dWZgEvrgALjF6AGjqlpgLsoCI8YXpFzIBZKIInYBpgSxqqAVLSdgemauwCylH4Q4RoROgVn2Q8gudk6nITqo19qHlOE29kYb3_qUvYWm9aH2YQ11ztpuoA8joO240i3cDTrkoYMbt4f1yEdvhuz7ANM-Zdela3DZ6Da5m9M7B18vz5_Lt2L18fq-fFoVlmKai6bBNTOEl85URFJnLBMCC6YlQmXJHGFEyMZVzkiJLRIcWS1rQWtCGKtKRufg_vjvePtucCmrzifr2lYH1w9JYSEpIXwcI_p4RG3sU4quUdZnfTg6R-1bhZE6lFWHaupQTZFSSXUsO9rsj72NvtNx_693d_K--7DejT3PIues4oIhQX8Ba9uLTQ
CitedBy_id crossref_primary_10_1007_s11128_018_2013_8
crossref_primary_10_1088_1674_1056_ac8730
crossref_primary_10_1103_PhysRevApplied_22_044076
crossref_primary_10_1007_s11128_022_03487_9
crossref_primary_10_1140_epjqt_s40507_023_00178_x
crossref_primary_10_1038_srep16200
crossref_primary_10_1103_PhysRevA_102_022605
Cites_doi 10.1088/1367-2630/4/1/344
10.1140/epjd/e2007-00010-4
10.1103/PhysRevA.51.1863
10.1063/1.3597221
10.1364/OE.18.027938
10.1103/PhysRevLett.108.130503
10.1007/s11434-013-6037-2
10.1103/PhysRevLett.111.130502
10.1103/PhysRevLett.91.057901
10.1103/PhysRevLett.111.130501
10.1038/nphys629
10.1038/nphoton.2010.214
10.1103/PhysRevLett.85.441
10.1103/PhysRevA.84.062308
10.1088/1367-2630/11/6/065003
10.1103/RevModPhys.81.1301
10.1038/nphoton.2010.269
10.1080/09500340410001730986
10.26421/QIC7.1-2-3
10.26421/QIC4.5-1
10.1364/OE.19.023590
10.1007/s11433-014-5557-3
10.1103/PhysRevA.75.032314
10.1126/science.283.5410.2050
10.1103/PhysRevA.78.042333
10.1103/PhysRevLett.67.661
10.1063/1.3425737
ContentType Journal Article
DBID 2RA
92L
CQIGP
~WA
AAYXX
CITATION
7U5
8FD
H8D
L7M
DOI 10.1088/1674-1056/24/9/090305
DatabaseName 维普_期刊
中文科技期刊数据库-CALIS站点
中文科技期刊数据库-7.0平台
中文科技期刊数据库- 镜像站点
CrossRef
Solid State and Superconductivity Abstracts
Technology Research Database
Aerospace Database
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Aerospace Database
Solid State and Superconductivity Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
DatabaseTitleList
Aerospace Database
DeliveryMethod fulltext_linktorsrc
Discipline Physics
DocumentTitleAlternate Countermeasure against probabilistic blinding attack in practical quantum key distribution systems
EISSN 2058-3834
1741-4199
EndPage 115
ExternalDocumentID 10_1088_1674_1056_24_9_090305
665867507
GroupedDBID 02O
1JI
1WK
29B
2RA
4.4
5B3
5GY
5VR
5VS
5ZH
6J9
7.M
7.Q
92L
AAGCD
AAJIO
AAJKP
AALHV
AATNI
ABHWH
ABJNI
ABQJV
ACAFW
ACGFS
ACHIP
AEFHF
AENEX
AFUIB
AFYNE
AHSEE
AKPSB
ALMA_UNASSIGNED_HOLDINGS
ASPBG
ATQHT
AVWKF
AZFZN
BBWZM
CCEZO
CCVFK
CEBXE
CHBEP
CJUJL
CQIGP
CRLBU
CS3
DU5
EBS
EDWGO
EJD
EMSAF
EPQRW
EQZZN
FA0
FEDTE
HAK
HVGLF
IJHAN
IOP
IZVLO
JCGBZ
KNG
KOT
M45
N5L
NT-
NT.
PJBAE
Q02
RIN
RNS
ROL
RPA
RW3
SY9
TCJ
TGP
UCJ
W28
~WA
-SA
-S~
AAYXX
ACARI
ADEQX
AERVB
AGQPQ
AOAED
ARNYC
CAJEA
CITATION
Q--
U1G
U5K
7U5
8FD
AEINN
H8D
L7M
ID FETCH-LOGICAL-c313t-ff1d5b264eb8293ebc577175a900445e25279fe8eb991c0760ca9d73d22558453
ISSN 1674-1056
IngestDate Thu Sep 04 23:57:21 EDT 2025
Tue Jul 01 02:55:11 EDT 2025
Thu Apr 24 22:54:23 EDT 2025
Wed Feb 14 10:28:07 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 9
Language English
License http://iopscience.iop.org/info/page/text-and-data-mining
http://iopscience.iop.org/page/copyright
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c313t-ff1d5b264eb8293ebc577175a900445e25279fe8eb991c0760ca9d73d22558453
Notes countermeasure bound,single-photon detector,probabilistic blinding attack,quantum key distribution
In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate(QBER) introduced by Eve, by which Eve can acquire information without the countermeasure.
11-5639/O4
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
PQID 1793226932
PQPubID 23500
PageCount 5
ParticipantIDs proquest_miscellaneous_1793226932
crossref_citationtrail_10_1088_1674_1056_24_9_090305
crossref_primary_10_1088_1674_1056_24_9_090305
chongqing_primary_665867507
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2015-09-01
PublicationDateYYYYMMDD 2015-09-01
PublicationDate_xml – month: 09
  year: 2015
  text: 2015-09-01
  day: 01
PublicationDecade 2010
PublicationTitle Chinese physics B
PublicationTitleAlternate Chinese Physics
PublicationYear 2015
References Qi B (16) 2007; 7
22
Gottesman D (6) 2004; 4
24
25
26
27
28
29
Bennet C H (1) 1984
Makarov V (23) 2009; 11
Wang Y (11) 2014; 23
30
31
10
12
14
17
18
19
Xu F (15) 2010; 12
Li F Y (20) 2014; 31
2
Lütkenhaus N (13) 2002; 4
3
4
5
7
8
9
21
References_xml – volume: 4
  start-page: 44
  issn: 1367-2630
  year: 2002
  ident: 13
  publication-title: New J. Phys.
  doi: 10.1088/1367-2630/4/1/344
– ident: 7
  doi: 10.1140/epjd/e2007-00010-4
– ident: 12
  doi: 10.1103/PhysRevA.51.1863
– ident: 29
  doi: 10.1063/1.3597221
– ident: 26
  doi: 10.1364/OE.18.027938
– ident: 19
  doi: 10.1103/PhysRevLett.108.130503
– ident: 8
  doi: 10.1007/s11434-013-6037-2
– ident: 22
  doi: 10.1103/PhysRevLett.111.130502
– ident: 30
  doi: 10.1103/PhysRevLett.91.057901
– ident: 21
  doi: 10.1103/PhysRevLett.111.130501
– ident: 31
  doi: 10.1038/nphys629
– ident: 24
  doi: 10.1038/nphoton.2010.214
– ident: 4
  doi: 10.1103/PhysRevLett.85.441
– ident: 18
  doi: 10.1103/PhysRevA.84.062308
– volume: 11
  issn: 1367-2630
  year: 2009
  ident: 23
  publication-title: New J. Phys.
  doi: 10.1088/1367-2630/11/6/065003
– year: 1984
  ident: 1
  publication-title: Processings of IEEE International Conference on Computers, Systems and Singnal Processing
– ident: 9
  doi: 10.1103/RevModPhys.81.1301
– ident: 28
  doi: 10.1038/nphoton.2010.269
– ident: 10
  doi: 10.1080/09500340410001730986
– volume: 7
  start-page: 73
  issn: 1533-7146
  year: 2007
  ident: 16
  publication-title: Quant. Inf. Comput.
  doi: 10.26421/QIC7.1-2-3
– volume: 31
  issn: 0256-307X
  year: 2014
  ident: 20
  publication-title: Chin. Phys. Lett.
– volume: 4
  start-page: 325
  issn: 1533-7146
  year: 2004
  ident: 6
  publication-title: Quantum Inf. Comput.
  doi: 10.26421/QIC4.5-1
– volume: 23
  issn: 1674-1056
  year: 2014
  ident: 11
  publication-title: Chin. Phys. B
– ident: 27
  doi: 10.1364/OE.19.023590
– volume: 12
  issn: 1367-2630
  year: 2010
  ident: 15
  publication-title: New J. Phys.
– ident: 5
  doi: 10.1007/s11433-014-5557-3
– ident: 14
  doi: 10.1103/PhysRevA.75.032314
– ident: 3
  doi: 10.1126/science.283.5410.2050
– ident: 17
  doi: 10.1103/PhysRevA.78.042333
– ident: 2
  doi: 10.1103/PhysRevLett.67.661
– ident: 25
  doi: 10.1063/1.3425737
SSID ssj0061023
ssib054405859
ssib000804704
Score 2.0605438
Snippet In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack....
In a practical quantum key distribution (QKD) system, imperfect equipment, especially the single-photon detector, can be eavesdropped on by a blinding attack....
SourceID proquest
crossref
chongqing
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 111
SubjectTerms Bit error rate
Computer information security
Countermeasures
Detectors
Mathematical models
Probabilistic methods
Probability theory
Quantum cryptography
分配系统
单光子探测器
攻击模型
比特错误率
直接检测
约束问题
量子密钥分配
随机
Title Countermeasure against probabilistic blinding attack in practical quantum key distribution systems
URI http://lib.cqvip.com/qk/85823A/201509/665867507.html
https://www.proquest.com/docview/1793226932
Volume 24
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NaxQxFA9rRfBSrB-4rZUI3pZ05yMzkxxFKm0PWqHF6iUkM9nt0jprnRkQ_3rfm0xmZ6So9RKWMHkLeb-8vO8Q8lpzGUhjC6ZllDAOR5tJXqRgpSzAZBYmiHSbIPs-PTrnJxfJxWTyY5C11NTmIP95a13J_3AV5oCvWCV7B872RGECfgN_YQQOw_hPPMaCchStzs8300sw86sac65M2zgXezDPzPXKVa7outb5VZs27kqjgDs3Dexs83UGRxljNf3zV12H52qou-JT27aynTOk2rzX_HHlvKif1-WSnTSbJB_3IjbOfrKrjdfVyTmGn_dCx7Uy-HJpS4bklkNvRJj06VZegKYZB9HumoV7CeuqpDskyYG4lChubhXkIPzQp-CpYd0Kx2SONtjkV43bZ_92rfXJhm2YXQiFxBQSUxFXUjky98j9KMvaAP_xh1N_h6fY0AJNdf__vvZLiHk_N4_4XM4dGezMcQm7dgPsHGs44wu-1VrOHpHtztygbxx2dsjElo_Jg1PHwSfEjBFEOwTREYKoRxB1CKKrkvYIoh2CKCCIDhFEOwQ9JefvDs_eHrHu1Q2Wx2Fcs8UiLBIDerI1AnRBa_IENihLtMTgf2KjJMrkwgprwLTIMbCba1lkcQE3A2izSfyMbJXr0j4nNBSBjlsTpIC7QsICbuJc52lqAiOEmJK9ftfUN9ddRaWgE4MVG2RTwv0-qrxrWI_vplyrP3J0Sg76ZZ7mXxa88kxSIFsxYKZLu24qhZcXmCcw7N6V6B556I5HzEL5gmzV3xu7D-prbV62SPsF_IKTyQ
linkProvider IOP Publishing
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Countermeasure+against+probabilistic+blinding+attack+in+practical+quantum+key+distribution+systems&rft.jtitle=Chinese+physics+B&rft.au=Qian%2C+Yong-Jun&rft.au=Li%2C+Hong-Wei&rft.au=He%2C+De-Yong&rft.au=Yin%2C+Zhen-Qiang&rft.date=2015-09-01&rft.issn=1674-1056&rft.volume=24&rft.issue=9&rft.spage=90305&rft_id=info:doi/10.1088%2F1674-1056%2F24%2F9%2F090305&rft.externalDBID=n%2Fa&rft.externalDocID=10_1088_1674_1056_24_9_090305
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F85823A%2F85823A.jpg