摘要
本文主要解决在现实条件下,量子密钥分发系统中光纤分束器的波长相关特性引起的测量基矢选择不随机的安全性问题,通过分析分束器波长相关性引起的误码粒子分布偏差的大小,理论推算实际系统中可提炼的最终安全码的下限,从而较好地解决了存在被动基矢选择的波长相关性漏洞的安全性问题,给出了类似安全性攻击方案的一个解决方法.
The manuscript intend to offer a solution to the security loophole induced by the wave-length dependence of the fibre beam splitter loss. The lower bound of the final secure key rate generated by a practical QKD system is theoretically deduced via analysis on the quantum key error rate influenced by wave-length dependence of the fibre beam splitter. Thus, we made up the security loophole pretty well, and provide a solution to similar quantum hack scheme.
引文
1 Diffie W,Hellman M E.New directions in cryptography.IEEE Trans Inform Theory,1976,22:644–654
2 Rivest R L,Shamir A,Adleman L.A method for obtaining digital signatures and public-key cryptosystems.ACM Commun,1978,21:120–126
3 Gaithersburg M D.National institute for standards and technology(NIST).Handbook Board Examiners,MBNQA,1993
4 Stinson D R.Cryptography:Theory and Practice.3rd ed.Boca Raton:CRC Press,Inc,2006
5 Shor P W.Algorithms for quantum computation:discrete logarithms and factoring.In:Proceedings of the 35th Annual Symposium on the Foundations of Computer Science,New York,1994.124–134
6 Lo H K,Chau H F.Unconditional security of quantum key distribution over arbitrarily long distances.Science,1999,283 :2050–2056
7 Shor P W,Preskill J.Simple proof of security of the BB84 quantum key distribution protocol.Phys Rev Lett,2000,85 :441–444
8 Zhao Y B,Fung C H F,Han Z F,et al.Security proof of differential phase shift quantum key distribution in the noiseless case.Phys Rev A,2008,78:042330
9 Leverrier A,Grangier P.Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation.Phys Rev Lett,2009,102:180504
10 Shannon C E.Communication theory of secrecy systems.Bell Syst Tech J,1949,28:656–715
11 Gottesman D,Lo H K,Lukenhaus N,et al.Security of quantum key distribution with imperfect devices.Quantum Inf Comput,2004,4:325–360
12 Hwang W Y.Quantum key distribution with high loss:toward global secure communication.Phys Rev Lett,2003,91:057901
13 Wang X B.Beating the photon-number-splitting attack in practical quantum cryptography.Phys Rev Lett,2005,94:230503
14 Lo H K,Ma X,Chen K.Decoy state quantum key distribution.Phys Rev Lett,2005,94:230504
15 Wang X B,Peng C Z,Pan J W.Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source.Appl Phys Lett,2007,90:031110
16 Wang X B.Decoy-state quantum key distribution with large random errors of light intensity.Phys Rev A,2007,75:052301
17 Wang X B,Peng C Z,Zhang J,et al.General theory of decoy-state quantum cryptography with source errors.Phys Rev A,2008,77:042311
18 Wang X B,Yang L,Peng C Z,et al.Decoy-state quantum key distribution with both source errors and statistical fluctuations.New J Phys,2009,11:075006
19 Muller A,Herzog T,Huttner B,et al.Plug and play systems for quantum cryptography.Appl Phys Lett,1997,70:793 –795
20 Zhao Y,Qi B,Lo H K.Quantum key distribution with an unknown and untrusted source.Phys Rev A,2008,77:052327
21 Peng X,Jiang H,Xu B J,et al.Experimental quantum-key distribution with an untrusted source.Opt Lett,2008,33 :2077–2079
22 Zhao Y,Qi B,Lo H K,et al.Security analysis of an untrusted source for quantum key distribution:passive approach.New J Phys,2010,12:023024
23 Nauerth S,F¨urst M,Schmitt-Manderbach T,et al.Information leakage via side channels in freespace BB84 quantum cryptography.New J Phys,2009,11:065001
24 Makarov V,Anisimov A,Skaar J.Effects of detector efficiency mismatch on security of quantum cryptosystems.Phys Rev A,2006,74:022313
25 Makarov V,Hjelme D R.Faked states attack on quantum cryptosystems.J Mod Opt,2005,52:691–705
26 Qi B,Fung C H F,Lo H K,et al.Time-shift attack in practical quantum cryptosystems.Quantum Inf Comput,2007,7 :73–82
27 Zhao Y,Fung C H F,Qi B,et al.Quantum hacking:experimental demonstration of time-shift attack against practical quantum-key-distribution systems.Phys Rev A,2008,78:042333
28 Lydersen L,Wiechers C,Wittmann C,et al.Hacking commercial quantum cryptography systems by tailored bright illumination.Nat Photonics,2010,4:686–689
29 Yuan Z L,Dynes J F,Shields A J.Avoiding the blinding attack in QKD.Nat Photonics,2010,4:800–801
30 Lydersen L,Wiechers C,Wittmann C,et al.Avoiding the blinding attack in QKD.Nat Photonics,2010,4:801
31 Wiechers C,Lydersen L,Wittmann C,et al.After-gate attack on a quantum cryptosystem.New J Phys,2011,13:013043
32 Henning W,Harald K,Markus R,et al.Quantum eavesdropping without interception an attack exploiting the dead time of single photon detectors.New J Phys,2011,13:073024
33 Liu D,Yin Z Q,Wang S,et al.Estimation of key rate after setting dead time.Chin Phys B,2012,21:6060202
34 Fung C H F,Qi B,Kiyoshi T,et al.Phase-remapping attack in practical quantum-key-distribution systems.Phys Rev A,2007,75:032314
35 Xu F,Qi B,Lo H K.Experimental demonstration of phase-remapping attack in a practical quantum key distribution system.New J Phys,2010,12:113026
36 Sun S H,Gao M,Jiang M S,et al.Partially random phase attack to the practical two-way quantum-key-distribution system.Phys Rev A,2012,85:032304
37 Li H W,Yin Z Q,Han Z F,et al.Security of practical phase-coding quantum key distribution.Quantum Inf Comput,2010,10:0771–0779
38 Li H W,Yin Z Q,Wang S,et al.Security of quantum key distribution with state-dependent imperfections.Quantum Inf Comput,2011,11:0937–0947
39 Huang J Z,Yin Z Q,Han Z F,et al.Effect of intensity modulator extinction on practical quantum key distribution system.Eur Phys J D,2012,66:159
40 Sun S H,Jiang M S,Liang L M.Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system.Phys Rev A,2011,83:062331
41 Li H W,Wang S,Huang J Z,et al.Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multi-wavelength sources.Phys Rev A,2011,84:062308
42 Ankiewicz A,Snyder A,Zheng X H.Coupling between parallel optical fiber cores—critical examination.Lightw Technol J,1986,4:1317–1323
43 Tekippe V.Passive fiber-optic components made by the fused biconical taper process.Fiber Int Opt,1990,9:97–123
1)http://www.idquantique.com/,http://www.magiqtech.com/,http://quintessencelabs.com/,http://www.quantuminfo.com/.