Cargando…

Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution

Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We s...

Descripción completa

Detalles Bibliográficos
Autores principales: Jogenfors, Jonathan, Elhassan, Ashraf Mohamed, Ahrens, Johan, Bourennane, Mohamed, Larsson, Jan-Åke
Formato: Online Artículo Texto
Lenguaje:English
Publicado: American Association for the Advancement of Science 2015
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4730850/
https://www.ncbi.nlm.nih.gov/pubmed/26824059
http://dx.doi.org/10.1126/sciadv.1500793
_version_ 1782412483615522816
author Jogenfors, Jonathan
Elhassan, Ashraf Mohamed
Ahrens, Johan
Bourennane, Mohamed
Larsson, Jan-Åke
author_facet Jogenfors, Jonathan
Elhassan, Ashraf Mohamed
Ahrens, Johan
Bourennane, Mohamed
Larsson, Jan-Åke
author_sort Jogenfors, Jonathan
collection PubMed
description Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. We reach Bell values up to 3.63 at 97.6% faked detector efficiency using tailored pulses of classical light, which exceeds even the quantum prediction. This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for energy-time entanglement setups based on Franson’s configuration. However, device-independent security can be reestablished, and we conclude by listing a number of improved tests and experimental setups that would protect against all current and future attacks of this type.
format Online
Article
Text
id pubmed-4730850
institution National Center for Biotechnology Information
language English
publishDate 2015
publisher American Association for the Advancement of Science
record_format MEDLINE/PubMed
spelling pubmed-47308502016-01-28 Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution Jogenfors, Jonathan Elhassan, Ashraf Mohamed Ahrens, Johan Bourennane, Mohamed Larsson, Jan-Åke Sci Adv Research Articles Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. We reach Bell values up to 3.63 at 97.6% faked detector efficiency using tailored pulses of classical light, which exceeds even the quantum prediction. This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for energy-time entanglement setups based on Franson’s configuration. However, device-independent security can be reestablished, and we conclude by listing a number of improved tests and experimental setups that would protect against all current and future attacks of this type. American Association for the Advancement of Science 2015-12-18 /pmc/articles/PMC4730850/ /pubmed/26824059 http://dx.doi.org/10.1126/sciadv.1500793 Text en Copyright © 2015, The Authors http://creativecommons.org/licenses/by-nc/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial license (http://creativecommons.org/licenses/by-nc/4.0/) , which permits use, distribution, and reproduction in any medium, so long as the resultant use is not for commercial advantage and provided the original work is properly cited.
spellingShingle Research Articles
Jogenfors, Jonathan
Elhassan, Ashraf Mohamed
Ahrens, Johan
Bourennane, Mohamed
Larsson, Jan-Åke
Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution
title Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution
title_full Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution
title_fullStr Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution
title_full_unstemmed Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution
title_short Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution
title_sort hacking the bell test using classical light in energy-time entanglement–based quantum key distribution
topic Research Articles
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4730850/
https://www.ncbi.nlm.nih.gov/pubmed/26824059
http://dx.doi.org/10.1126/sciadv.1500793
work_keys_str_mv AT jogenforsjonathan hackingthebelltestusingclassicallightinenergytimeentanglementbasedquantumkeydistribution
AT elhassanashrafmohamed hackingthebelltestusingclassicallightinenergytimeentanglementbasedquantumkeydistribution
AT ahrensjohan hackingthebelltestusingclassicallightinenergytimeentanglementbasedquantumkeydistribution
AT bourennanemohamed hackingthebelltestusingclassicallightinenergytimeentanglementbasedquantumkeydistribution
AT larssonjanake hackingthebelltestusingclassicallightinenergytimeentanglementbasedquantumkeydistribution