Security analysis on some experimental quantum key distribution systems with imperfect optical and electrical devices
In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical...
Saved in:
Published in | Frontiers of physics Vol. 9; no. 5; pp. 613 - 628 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Heidelberg
Higher Education Press
01.10.2014
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503]. |
---|---|
Bibliography: | quantum key distribution quantum hacking Document accepted on :2014-03-20 Document received on :2013-12-09 quantum cryptography |
ISSN: | 2095-0462 2095-0470 |
DOI: | 10.1007/s11467-014-0420-6 |