File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1103/PhysRevA.75.032314
- Scopus: eid_2-s2.0-33947205243
- WOS: WOS:000245326300046
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Phase-remapping attack in practical quantum-key-distribution systems
Title | Phase-remapping attack in practical quantum-key-distribution systems |
---|---|
Authors | |
Issue Date | 2007 |
Citation | Physical Review A - Atomic, Molecular, and Optical Physics, 2007, v. 75, n. 3, article no. 032314 How to Cite? |
Abstract | Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the "plug-and-play" system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem. © 2007 The American Physical Society. |
Persistent Identifier | http://hdl.handle.net/10722/285914 |
ISSN | 2014 Impact Factor: 2.808 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Fung, Chi Hang Fred | - |
dc.contributor.author | Qi, Bing | - |
dc.contributor.author | Tamaki, Kiyoshi | - |
dc.contributor.author | Lo, Hoi Kwong | - |
dc.date.accessioned | 2020-08-18T04:56:58Z | - |
dc.date.available | 2020-08-18T04:56:58Z | - |
dc.date.issued | 2007 | - |
dc.identifier.citation | Physical Review A - Atomic, Molecular, and Optical Physics, 2007, v. 75, n. 3, article no. 032314 | - |
dc.identifier.issn | 1050-2947 | - |
dc.identifier.uri | http://hdl.handle.net/10722/285914 | - |
dc.description.abstract | Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the "plug-and-play" system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem. © 2007 The American Physical Society. | - |
dc.language | eng | - |
dc.relation.ispartof | Physical Review A - Atomic, Molecular, and Optical Physics | - |
dc.title | Phase-remapping attack in practical quantum-key-distribution systems | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1103/PhysRevA.75.032314 | - |
dc.identifier.scopus | eid_2-s2.0-33947205243 | - |
dc.identifier.volume | 75 | - |
dc.identifier.issue | 3 | - |
dc.identifier.spage | article no. 032314 | - |
dc.identifier.epage | article no. 032314 | - |
dc.identifier.eissn | 1094-1622 | - |
dc.identifier.isi | WOS:000245326300046 | - |
dc.identifier.issnl | 1050-2947 | - |