Cargando…
Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution
Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We s...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
American Association for the Advancement of Science
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4730850/ https://www.ncbi.nlm.nih.gov/pubmed/26824059 http://dx.doi.org/10.1126/sciadv.1500793 |
_version_ | 1782412483615522816 |
---|---|
author | Jogenfors, Jonathan Elhassan, Ashraf Mohamed Ahrens, Johan Bourennane, Mohamed Larsson, Jan-Åke |
author_facet | Jogenfors, Jonathan Elhassan, Ashraf Mohamed Ahrens, Johan Bourennane, Mohamed Larsson, Jan-Åke |
author_sort | Jogenfors, Jonathan |
collection | PubMed |
description | Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. We reach Bell values up to 3.63 at 97.6% faked detector efficiency using tailored pulses of classical light, which exceeds even the quantum prediction. This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for energy-time entanglement setups based on Franson’s configuration. However, device-independent security can be reestablished, and we conclude by listing a number of improved tests and experimental setups that would protect against all current and future attacks of this type. |
format | Online Article Text |
id | pubmed-4730850 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2015 |
publisher | American Association for the Advancement of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-47308502016-01-28 Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution Jogenfors, Jonathan Elhassan, Ashraf Mohamed Ahrens, Johan Bourennane, Mohamed Larsson, Jan-Åke Sci Adv Research Articles Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution (QKD) so that an attacker cannot eavesdrop or control the system. We show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. We reach Bell values up to 3.63 at 97.6% faked detector efficiency using tailored pulses of classical light, which exceeds even the quantum prediction. This is the first demonstration of a violation-faking source that gives both tunable violation and high faked detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for energy-time entanglement setups based on Franson’s configuration. However, device-independent security can be reestablished, and we conclude by listing a number of improved tests and experimental setups that would protect against all current and future attacks of this type. American Association for the Advancement of Science 2015-12-18 /pmc/articles/PMC4730850/ /pubmed/26824059 http://dx.doi.org/10.1126/sciadv.1500793 Text en Copyright © 2015, The Authors http://creativecommons.org/licenses/by-nc/4.0/ This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial license (http://creativecommons.org/licenses/by-nc/4.0/) , which permits use, distribution, and reproduction in any medium, so long as the resultant use is not for commercial advantage and provided the original work is properly cited. |
spellingShingle | Research Articles Jogenfors, Jonathan Elhassan, Ashraf Mohamed Ahrens, Johan Bourennane, Mohamed Larsson, Jan-Åke Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution |
title | Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution |
title_full | Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution |
title_fullStr | Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution |
title_full_unstemmed | Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution |
title_short | Hacking the Bell test using classical light in energy-time entanglement–based quantum key distribution |
title_sort | hacking the bell test using classical light in energy-time entanglement–based quantum key distribution |
topic | Research Articles |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4730850/ https://www.ncbi.nlm.nih.gov/pubmed/26824059 http://dx.doi.org/10.1126/sciadv.1500793 |
work_keys_str_mv | AT jogenforsjonathan hackingthebelltestusingclassicallightinenergytimeentanglementbasedquantumkeydistribution AT elhassanashrafmohamed hackingthebelltestusingclassicallightinenergytimeentanglementbasedquantumkeydistribution AT ahrensjohan hackingthebelltestusingclassicallightinenergytimeentanglementbasedquantumkeydistribution AT bourennanemohamed hackingthebelltestusingclassicallightinenergytimeentanglementbasedquantumkeydistribution AT larssonjanake hackingthebelltestusingclassicallightinenergytimeentanglementbasedquantumkeydistribution |