量子密钥分发中波长相关攻击安全性研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Security of quantum key distribution under the wavelengthdependent quantum hack
  • 作者:周飞 ; 赵梅生 ; 王向斌
  • 英文作者:ZHOU Fei;ZHAO MeiSheng;WANG XiangBin;Department of Physics and State Key Laboratory of Low Dimensional Quantum Physics, Tsinghua University;Jinan Institute of Quantum Technology, Shandong Academy of Information Technology;Shandong Institute of Quantum Science and Technology Co., Ltd.;
  • 关键词:量子密钥分发 ; 非理想性 ; 基矢随机选择 ; 波长相关攻击 ; 系统安全性
  • 英文关键词:quantum key distribution,imperfection,randomness of basis election,wavelength-dependent quantum hack,system security
  • 中文刊名:PZKX
  • 英文刊名:Scientia Sinica(Informationis)
  • 机构:清华大学物理系低维量子物理国家重点实验室;济南量子技术研究院;山东量子科学技术研究院有限公司;
  • 出版日期:2014-03-20
  • 出版单位:中国科学:信息科学
  • 年:2014
  • 期:v.44
  • 基金:国家自然科学基金(批准号:61073174,61033001,61061130540)资助项目
  • 语种:中文;
  • 页:PZKX201403004
  • 页数:7
  • CN:03
  • ISSN:11-5846/TP
  • 分类号:32-38
摘要
本文主要解决在现实条件下,量子密钥分发系统中光纤分束器的波长相关特性引起的测量基矢选择不随机的安全性问题,通过分析分束器波长相关性引起的误码粒子分布偏差的大小,理论推算实际系统中可提炼的最终安全码的下限,从而较好地解决了存在被动基矢选择的波长相关性漏洞的安全性问题,给出了类似安全性攻击方案的一个解决方法.
        The manuscript intend to offer a solution to the security loophole induced by the wave-length dependence of the fibre beam splitter loss. The lower bound of the final secure key rate generated by a practical QKD system is theoretically deduced via analysis on the quantum key error rate influenced by wave-length dependence of the fibre beam splitter. Thus, we made up the security loophole pretty well, and provide a solution to similar quantum hack scheme.
引文
1 Diffie W,Hellman M E.New directions in cryptography.IEEE Trans Inform Theory,1976,22:644–654
    2 Rivest R L,Shamir A,Adleman L.A method for obtaining digital signatures and public-key cryptosystems.ACM Commun,1978,21:120–126
    3 Gaithersburg M D.National institute for standards and technology(NIST).Handbook Board Examiners,MBNQA,1993
    4 Stinson D R.Cryptography:Theory and Practice.3rd ed.Boca Raton:CRC Press,Inc,2006
    5 Shor P W.Algorithms for quantum computation:discrete logarithms and factoring.In:Proceedings of the 35th Annual Symposium on the Foundations of Computer Science,New York,1994.124–134
    6 Lo H K,Chau H F.Unconditional security of quantum key distribution over arbitrarily long distances.Science,1999,283 :2050–2056
    7 Shor P W,Preskill J.Simple proof of security of the BB84 quantum key distribution protocol.Phys Rev Lett,2000,85 :441–444
    8 Zhao Y B,Fung C H F,Han Z F,et al.Security proof of differential phase shift quantum key distribution in the noiseless case.Phys Rev A,2008,78:042330
    9 Leverrier A,Grangier P.Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation.Phys Rev Lett,2009,102:180504
    10 Shannon C E.Communication theory of secrecy systems.Bell Syst Tech J,1949,28:656–715
    11 Gottesman D,Lo H K,Lukenhaus N,et al.Security of quantum key distribution with imperfect devices.Quantum Inf Comput,2004,4:325–360
    12 Hwang W Y.Quantum key distribution with high loss:toward global secure communication.Phys Rev Lett,2003,91:057901
    13 Wang X B.Beating the photon-number-splitting attack in practical quantum cryptography.Phys Rev Lett,2005,94:230503
    14 Lo H K,Ma X,Chen K.Decoy state quantum key distribution.Phys Rev Lett,2005,94:230504
    15 Wang X B,Peng C Z,Pan J W.Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source.Appl Phys Lett,2007,90:031110
    16 Wang X B.Decoy-state quantum key distribution with large random errors of light intensity.Phys Rev A,2007,75:052301
    17 Wang X B,Peng C Z,Zhang J,et al.General theory of decoy-state quantum cryptography with source errors.Phys Rev A,2008,77:042311
    18 Wang X B,Yang L,Peng C Z,et al.Decoy-state quantum key distribution with both source errors and statistical fluctuations.New J Phys,2009,11:075006
    19 Muller A,Herzog T,Huttner B,et al.Plug and play systems for quantum cryptography.Appl Phys Lett,1997,70:793 –795
    20 Zhao Y,Qi B,Lo H K.Quantum key distribution with an unknown and untrusted source.Phys Rev A,2008,77:052327
    21 Peng X,Jiang H,Xu B J,et al.Experimental quantum-key distribution with an untrusted source.Opt Lett,2008,33 :2077–2079
    22 Zhao Y,Qi B,Lo H K,et al.Security analysis of an untrusted source for quantum key distribution:passive approach.New J Phys,2010,12:023024
    23 Nauerth S,F¨urst M,Schmitt-Manderbach T,et al.Information leakage via side channels in freespace BB84 quantum cryptography.New J Phys,2009,11:065001
    24 Makarov V,Anisimov A,Skaar J.Effects of detector efficiency mismatch on security of quantum cryptosystems.Phys Rev A,2006,74:022313
    25 Makarov V,Hjelme D R.Faked states attack on quantum cryptosystems.J Mod Opt,2005,52:691–705
    26 Qi B,Fung C H F,Lo H K,et al.Time-shift attack in practical quantum cryptosystems.Quantum Inf Comput,2007,7 :73–82
    27 Zhao Y,Fung C H F,Qi B,et al.Quantum hacking:experimental demonstration of time-shift attack against practical quantum-key-distribution systems.Phys Rev A,2008,78:042333
    28 Lydersen L,Wiechers C,Wittmann C,et al.Hacking commercial quantum cryptography systems by tailored bright illumination.Nat Photonics,2010,4:686–689
    29 Yuan Z L,Dynes J F,Shields A J.Avoiding the blinding attack in QKD.Nat Photonics,2010,4:800–801
    30 Lydersen L,Wiechers C,Wittmann C,et al.Avoiding the blinding attack in QKD.Nat Photonics,2010,4:801
    31 Wiechers C,Lydersen L,Wittmann C,et al.After-gate attack on a quantum cryptosystem.New J Phys,2011,13:013043
    32 Henning W,Harald K,Markus R,et al.Quantum eavesdropping without interception an attack exploiting the dead time of single photon detectors.New J Phys,2011,13:073024
    33 Liu D,Yin Z Q,Wang S,et al.Estimation of key rate after setting dead time.Chin Phys B,2012,21:6060202
    34 Fung C H F,Qi B,Kiyoshi T,et al.Phase-remapping attack in practical quantum-key-distribution systems.Phys Rev A,2007,75:032314
    35 Xu F,Qi B,Lo H K.Experimental demonstration of phase-remapping attack in a practical quantum key distribution system.New J Phys,2010,12:113026
    36 Sun S H,Gao M,Jiang M S,et al.Partially random phase attack to the practical two-way quantum-key-distribution system.Phys Rev A,2012,85:032304
    37 Li H W,Yin Z Q,Han Z F,et al.Security of practical phase-coding quantum key distribution.Quantum Inf Comput,2010,10:0771–0779
    38 Li H W,Yin Z Q,Wang S,et al.Security of quantum key distribution with state-dependent imperfections.Quantum Inf Comput,2011,11:0937–0947
    39 Huang J Z,Yin Z Q,Han Z F,et al.Effect of intensity modulator extinction on practical quantum key distribution system.Eur Phys J D,2012,66:159
    40 Sun S H,Jiang M S,Liang L M.Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system.Phys Rev A,2011,83:062331
    41 Li H W,Wang S,Huang J Z,et al.Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multi-wavelength sources.Phys Rev A,2011,84:062308
    42 Ankiewicz A,Snyder A,Zheng X H.Coupling between parallel optical fiber cores—critical examination.Lightw Technol J,1986,4:1317–1323
    43 Tekippe V.Passive fiber-optic components made by the fused biconical taper process.Fiber Int Opt,1990,9:97–123
    1)http://www.idquantique.com/,http://www.magiqtech.com/,http://quintessencelabs.com/,http://www.quantuminfo.com/.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700