Cargando…
Counterfactual quantum key distribution with untrusted detectors
Compared with the traditional BB84 protocol, the counterfactual quantum key distribution (QKD) does not rely on any signal travelling in the quantum channel, and therefore can present a security advantage where Eve cannot fully access signal. However, the practical system may be damaged in a scenari...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9984423/ https://www.ncbi.nlm.nih.gov/pubmed/36879753 http://dx.doi.org/10.1016/j.heliyon.2023.e13719 |
_version_ | 1784900742856835072 |
---|---|
author | Lin, Ya-Qian Wang, Meng Yang, Xiu-Qing Liu, Hong-Wei |
author_facet | Lin, Ya-Qian Wang, Meng Yang, Xiu-Qing Liu, Hong-Wei |
author_sort | Lin, Ya-Qian |
collection | PubMed |
description | Compared with the traditional BB84 protocol, the counterfactual quantum key distribution (QKD) does not rely on any signal travelling in the quantum channel, and therefore can present a security advantage where Eve cannot fully access signal. However, the practical system may be damaged in a scenario where the devices are untrusted. In this paper, we analyze the security of counterfactual QKD in untrusted detectors scenario. We show that the requirement to disclose “which detector clicked” has become the main loophole in all counterfactual QKD versions. An eavesdropping scheme which is similar to the memory attack on device-independent QKD could break its security by exploiting detectors' imperfections. We consider two different counterfactual QKD protocols and analyze their security against this major loophole. One is a modified Noh09 protocol, which would be secure in untrusted detectors context. Another is a variant of counterfactual QKD with high efficiency (Phys. Rev. A 104 (2021) 022424) against a series of detectors side-channel attacks as well as against other attacks that exploit detectors imperfections. |
format | Online Article Text |
id | pubmed-9984423 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Elsevier |
record_format | MEDLINE/PubMed |
spelling | pubmed-99844232023-03-05 Counterfactual quantum key distribution with untrusted detectors Lin, Ya-Qian Wang, Meng Yang, Xiu-Qing Liu, Hong-Wei Heliyon Research Article Compared with the traditional BB84 protocol, the counterfactual quantum key distribution (QKD) does not rely on any signal travelling in the quantum channel, and therefore can present a security advantage where Eve cannot fully access signal. However, the practical system may be damaged in a scenario where the devices are untrusted. In this paper, we analyze the security of counterfactual QKD in untrusted detectors scenario. We show that the requirement to disclose “which detector clicked” has become the main loophole in all counterfactual QKD versions. An eavesdropping scheme which is similar to the memory attack on device-independent QKD could break its security by exploiting detectors' imperfections. We consider two different counterfactual QKD protocols and analyze their security against this major loophole. One is a modified Noh09 protocol, which would be secure in untrusted detectors context. Another is a variant of counterfactual QKD with high efficiency (Phys. Rev. A 104 (2021) 022424) against a series of detectors side-channel attacks as well as against other attacks that exploit detectors imperfections. Elsevier 2023-02-13 /pmc/articles/PMC9984423/ /pubmed/36879753 http://dx.doi.org/10.1016/j.heliyon.2023.e13719 Text en © 2023 The Authors. Published by Elsevier Ltd. https://creativecommons.org/licenses/by/4.0/This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Research Article Lin, Ya-Qian Wang, Meng Yang, Xiu-Qing Liu, Hong-Wei Counterfactual quantum key distribution with untrusted detectors |
title | Counterfactual quantum key distribution with untrusted detectors |
title_full | Counterfactual quantum key distribution with untrusted detectors |
title_fullStr | Counterfactual quantum key distribution with untrusted detectors |
title_full_unstemmed | Counterfactual quantum key distribution with untrusted detectors |
title_short | Counterfactual quantum key distribution with untrusted detectors |
title_sort | counterfactual quantum key distribution with untrusted detectors |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9984423/ https://www.ncbi.nlm.nih.gov/pubmed/36879753 http://dx.doi.org/10.1016/j.heliyon.2023.e13719 |
work_keys_str_mv | AT linyaqian counterfactualquantumkeydistributionwithuntrusteddetectors AT wangmeng counterfactualquantumkeydistributionwithuntrusteddetectors AT yangxiuqing counterfactualquantumkeydistributionwithuntrusteddetectors AT liuhongwei counterfactualquantumkeydistributionwithuntrusteddetectors |