Cargando…

Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution

By manipulating the reference pulses amplitude, a security vulnerability is caused by self-reference continuous-variable quantum key distribution. In this paper, we formalize an attack strategy for reference pulses, showing that the proposed attack can compromise the practical security of CVQKD prot...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhao, Wei, Shi, Ronghua, Huang, Duan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6890703/
https://www.ncbi.nlm.nih.gov/pubmed/31796759
http://dx.doi.org/10.1038/s41598-019-54249-0
_version_ 1783475665348067328
author Zhao, Wei
Shi, Ronghua
Huang, Duan
author_facet Zhao, Wei
Shi, Ronghua
Huang, Duan
author_sort Zhao, Wei
collection PubMed
description By manipulating the reference pulses amplitude, a security vulnerability is caused by self-reference continuous-variable quantum key distribution. In this paper, we formalize an attack strategy for reference pulses, showing that the proposed attack can compromise the practical security of CVQKD protocol. In this scheme, before the beam splitter attack, Eve intercepts the reference pulses emitted by Alice, using Bayesian algorithm to estimate phase shifts. Subsequently, other reference pulses are re-prepared and resubmitted to Bob. In simulations, Bayesian algorithm effectively estimates the phase drifts and has the high robustness to noise. Therefore, the eavesdropper can bias the excess noise due to the intercept-resend attack and the beam splitter attack. And Alice and Bob believe that their excess noise is below the null key threshold and can still share a secret key. Consequently, the proposed attack shows that its practical security can be compromised by transmitting the reference pulses in the continuous-variable quantum key distribution protocol.
format Online
Article
Text
id pubmed-6890703
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-68907032019-12-10 Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution Zhao, Wei Shi, Ronghua Huang, Duan Sci Rep Article By manipulating the reference pulses amplitude, a security vulnerability is caused by self-reference continuous-variable quantum key distribution. In this paper, we formalize an attack strategy for reference pulses, showing that the proposed attack can compromise the practical security of CVQKD protocol. In this scheme, before the beam splitter attack, Eve intercepts the reference pulses emitted by Alice, using Bayesian algorithm to estimate phase shifts. Subsequently, other reference pulses are re-prepared and resubmitted to Bob. In simulations, Bayesian algorithm effectively estimates the phase drifts and has the high robustness to noise. Therefore, the eavesdropper can bias the excess noise due to the intercept-resend attack and the beam splitter attack. And Alice and Bob believe that their excess noise is below the null key threshold and can still share a secret key. Consequently, the proposed attack shows that its practical security can be compromised by transmitting the reference pulses in the continuous-variable quantum key distribution protocol. Nature Publishing Group UK 2019-12-03 /pmc/articles/PMC6890703/ /pubmed/31796759 http://dx.doi.org/10.1038/s41598-019-54249-0 Text en © The Author(s) 2019 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
spellingShingle Article
Zhao, Wei
Shi, Ronghua
Huang, Duan
Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution
title Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution
title_full Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution
title_fullStr Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution
title_full_unstemmed Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution
title_short Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution
title_sort practical security analysis of reference pulses for continuous-variable quantum key distribution
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6890703/
https://www.ncbi.nlm.nih.gov/pubmed/31796759
http://dx.doi.org/10.1038/s41598-019-54249-0
work_keys_str_mv AT zhaowei practicalsecurityanalysisofreferencepulsesforcontinuousvariablequantumkeydistribution
AT shironghua practicalsecurityanalysisofreferencepulsesforcontinuousvariablequantumkeydistribution
AT huangduan practicalsecurityanalysisofreferencepulsesforcontinuousvariablequantumkeydistribution