Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices

In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical...

Full description

Saved in:
Bibliographic Details
Published inFrontiers of physics Vol. 9; no. 5; pp. 613 - 628
Main Authors Liang, Lin-Mei, Sun, Shi-Hai, Jiang, Mu-Sheng, Li, Chun-Yan
Format Journal Article
LanguageEnglish
Published Heidelberg Higher Education Press 01.10.2014
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].
Bibliography:quantum key distribution
quantum hacking
Document accepted on :2014-03-20
Document received on :2013-12-09
quantum cryptography
ISSN:2095-0462
2095-0470
DOI:10.1007/s11467-014-0420-6