scholarly journals Practical security of the continuous-variable quantum key distribution with real local oscillators under phase attack

2019 ◽  
Vol 27 (15) ◽  
pp. 20621 ◽  
Author(s):  
Biao Huang ◽  
Yongmei Huang ◽  
Zhenming Peng
Photonics ◽  
2021 ◽  
Vol 8 (11) ◽  
pp. 511
Author(s):  
Duan Huang ◽  
Susu Liu ◽  
Ling Zhang

Quantum key distribution (QKD) offers information-theoretical security, while real systems are thought not to promise practical security effectively. In the practical continuous-variable (CV) QKD system, the deviations between realistic devices and idealized models might introduce vulnerabilities for eavesdroppers and stressors for two parties. However, the common quantum hacking strategies and countermeasures inevitably increase the complexity of practical CV systems. Machine-learning techniques are utilized to explore how to perceive practical imperfections. Here, we review recent works on secure CVQKD systems with machine learning, where the methods for detections and attacks were studied.


2021 ◽  
pp. 1-1
Author(s):  
Khaled Abdulaziz Alaghbari ◽  
Konstantin Evgenievich Rumyantsev ◽  
Tawfig Eltaif ◽  
Osama Elmabrok ◽  
Heng-Siong Lim

2019 ◽  
Vol 9 (1) ◽  
Author(s):  
Wei Zhao ◽  
Ronghua Shi ◽  
Duan Huang

AbstractBy manipulating the reference pulses amplitude, a security vulnerability is caused by self-reference continuous-variable quantum key distribution. In this paper, we formalize an attack strategy for reference pulses, showing that the proposed attack can compromise the practical security of CVQKD protocol. In this scheme, before the beam splitter attack, Eve intercepts the reference pulses emitted by Alice, using Bayesian algorithm to estimate phase shifts. Subsequently, other reference pulses are re-prepared and resubmitted to Bob. In simulations, Bayesian algorithm effectively estimates the phase drifts and has the high robustness to noise. Therefore, the eavesdropper can bias the excess noise due to the intercept-resend attack and the beam splitter attack. And Alice and Bob believe that their excess noise is below the null key threshold and can still share a secret key. Consequently, the proposed attack shows that its practical security can be compromised by transmitting the reference pulses in the continuous-variable quantum key distribution protocol.


2018 ◽  
Vol 382 (12) ◽  
pp. 811-817 ◽  
Author(s):  
Cailang Xie ◽  
Ying Guo ◽  
Qin Liao ◽  
Wei Zhao ◽  
Duan Huang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document