Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2014 Apr 23:4:4759.
doi: 10.1038/srep04759.

Hacking on decoy-state quantum key distribution system with partial phase randomization

Affiliations

Hacking on decoy-state quantum key distribution system with partial phase randomization

Shi-Hai Sun et al. Sci Rep. .

Retraction in

Abstract

Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

PubMed Disclaimer

Figures

Figure 1
Figure 1. The diagram of the hybrid measurement attack.
r(s) is the signal (reference) pulse of Alice. BS: beam splitter with transmittance 1/2; D0 and D1 are single photon detectors (SPDs); d0 and d1 are photodiodes; x is the output of homodyne detection; LD: laser diode which is used by Eve to generate the reference pulse (LO pulse) of homodyne detection; PM: phase modulator which is used by Eve to modulate a phase (0 or π/2) on LO. Jr.Eve has the same equipments as Alice, which is used to resend faked states to Bob according to her measurement results. Note that, Eve measures both r and s of Alice with a interferometer in the single photon detection part, but she only measures the phase information of s in the homodyne detection part.
Figure 2
Figure 2
(a)The theoretical distribution of x for different encoding phase of Alice, which are drawn according to Eq.4. Here we assume ϕe = 0, δ = π/4 and μ = 0.3. (b) The error rate of Eve and Bob under our attack, which are drawn according to Eq.7. The solid line shows the error rate between Alice and Eve, and the dashed line shows the error rate between Alice and Bob. Here we set δ = 10°, x0 = 1.5, and assume that the detection setups of both Alice and Bob are perfect.
Figure 3
Figure 3. The estimated key rate of Alice and Bob under our attack.
But in fact, the key are insecure, since our attack corresponds to an entanglement-breaking channel and no secret key can be generated under this channel. Here we also show the equivalent channel length of Qμ, defined as len = −(10/a) log10{min(1, Qμ/(μηBob)} (a = 0.21 is the loss of standard fiber), which represents the minimal channel length of Alice and Bob that Eve can successfully load our attack. In the simulations, we assume that the SPD and homodyne detection of Eve are perfect, and set f(Eμ) = 1.22, Y0 = 1.7 × 10−6, ηBob = 0.045, μ = 0.48, and ν = 0.1 according to the experimental results of Ref. .
Figure 4
Figure 4. The estimated key rate of Alice and Bob for different μ and ν when Eve is present.
In the simulations, we set x0 = 1.5, δ = 10°, and other parameters are the same as Fig. 3.

Similar articles

Cited by

References

    1. Bennett C. H. & Brassard G. Quantum cryptography: public key distribution and coin tossing. Paper presented at International Conference on Computers, Systems and Signal Processing, Bangalore, India. New York: IEEE. p.175–179 (1984).
    1. Shor P. W. & Preskill J. Simple Proof of Security of the BB84 Quantum Key Distribution Protocol. Phys. Rev. Lett. 85, 441–444 (2000). - PubMed
    1. Gottesman D., Lo H. K., Lütkenhaus N. & Preskill J. Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 4, 325 (2004).
    1. Wang S. et al. 2 GHz clock quantum key distribution over 260 km of standard telecom fiber. Opt. Lett. 37, 1008–1010 (2012). - PubMed
    1. Namekata N., Adachi S. & Inoue S. 1.5 GHz single-photon detection at telecommunication wavelengths using sinusoidaly gated InGaAs/InP avalanche photodiode. Opt. Express 17, 6275–6282 (2009). - PubMed

Publication types

LinkOut - more resources