Cargando…

Counterfactual quantum key distribution with untrusted detectors

Compared with the traditional BB84 protocol, the counterfactual quantum key distribution (QKD) does not rely on any signal travelling in the quantum channel, and therefore can present a security advantage where Eve cannot fully access signal. However, the practical system may be damaged in a scenari...

Descripción completa

Detalles Bibliográficos
Autores principales: Lin, Ya-Qian, Wang, Meng, Yang, Xiu-Qing, Liu, Hong-Wei
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9984423/
https://www.ncbi.nlm.nih.gov/pubmed/36879753
http://dx.doi.org/10.1016/j.heliyon.2023.e13719
_version_ 1784900742856835072
author Lin, Ya-Qian
Wang, Meng
Yang, Xiu-Qing
Liu, Hong-Wei
author_facet Lin, Ya-Qian
Wang, Meng
Yang, Xiu-Qing
Liu, Hong-Wei
author_sort Lin, Ya-Qian
collection PubMed
description Compared with the traditional BB84 protocol, the counterfactual quantum key distribution (QKD) does not rely on any signal travelling in the quantum channel, and therefore can present a security advantage where Eve cannot fully access signal. However, the practical system may be damaged in a scenario where the devices are untrusted. In this paper, we analyze the security of counterfactual QKD in untrusted detectors scenario. We show that the requirement to disclose “which detector clicked” has become the main loophole in all counterfactual QKD versions. An eavesdropping scheme which is similar to the memory attack on device-independent QKD could break its security by exploiting detectors' imperfections. We consider two different counterfactual QKD protocols and analyze their security against this major loophole. One is a modified Noh09 protocol, which would be secure in untrusted detectors context. Another is a variant of counterfactual QKD with high efficiency (Phys. Rev. A 104 (2021) 022424) against a series of detectors side-channel attacks as well as against other attacks that exploit detectors imperfections.
format Online
Article
Text
id pubmed-9984423
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Elsevier
record_format MEDLINE/PubMed
spelling pubmed-99844232023-03-05 Counterfactual quantum key distribution with untrusted detectors Lin, Ya-Qian Wang, Meng Yang, Xiu-Qing Liu, Hong-Wei Heliyon Research Article Compared with the traditional BB84 protocol, the counterfactual quantum key distribution (QKD) does not rely on any signal travelling in the quantum channel, and therefore can present a security advantage where Eve cannot fully access signal. However, the practical system may be damaged in a scenario where the devices are untrusted. In this paper, we analyze the security of counterfactual QKD in untrusted detectors scenario. We show that the requirement to disclose “which detector clicked” has become the main loophole in all counterfactual QKD versions. An eavesdropping scheme which is similar to the memory attack on device-independent QKD could break its security by exploiting detectors' imperfections. We consider two different counterfactual QKD protocols and analyze their security against this major loophole. One is a modified Noh09 protocol, which would be secure in untrusted detectors context. Another is a variant of counterfactual QKD with high efficiency (Phys. Rev. A 104 (2021) 022424) against a series of detectors side-channel attacks as well as against other attacks that exploit detectors imperfections. Elsevier 2023-02-13 /pmc/articles/PMC9984423/ /pubmed/36879753 http://dx.doi.org/10.1016/j.heliyon.2023.e13719 Text en © 2023 The Authors. Published by Elsevier Ltd. https://creativecommons.org/licenses/by/4.0/This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Research Article
Lin, Ya-Qian
Wang, Meng
Yang, Xiu-Qing
Liu, Hong-Wei
Counterfactual quantum key distribution with untrusted detectors
title Counterfactual quantum key distribution with untrusted detectors
title_full Counterfactual quantum key distribution with untrusted detectors
title_fullStr Counterfactual quantum key distribution with untrusted detectors
title_full_unstemmed Counterfactual quantum key distribution with untrusted detectors
title_short Counterfactual quantum key distribution with untrusted detectors
title_sort counterfactual quantum key distribution with untrusted detectors
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9984423/
https://www.ncbi.nlm.nih.gov/pubmed/36879753
http://dx.doi.org/10.1016/j.heliyon.2023.e13719
work_keys_str_mv AT linyaqian counterfactualquantumkeydistributionwithuntrusteddetectors
AT wangmeng counterfactualquantumkeydistributionwithuntrusteddetectors
AT yangxiuqing counterfactualquantumkeydistributionwithuntrusteddetectors
AT liuhongwei counterfactualquantumkeydistributionwithuntrusteddetectors