2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference 2007
DOI: 10.1109/cleoe-iqec.2007.4386772
|View full text |Cite
|
Sign up to set email alerts
|

Calibration Attack and Defense in Continuous Variable Quantum Key Distribution

Abstract: We have found neew attacks agains Continuous Variable Quantum Key Distribution based on the accessibility of the phase reference beam by the adversary. We then give easy countermeasures to this attack and prove their security.Over the past few years, quantum continuous variables (CV) have been explored as an alternative to qubits for quantum key distribution (QKD). More specifically, protocols using coherent states and homodyne or heterodyne measurements have been proposed and experimentally demonstrated [1]. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(13 citation statements)
references
References 1 publication
0
13
0
Order By: Relevance
“…Since the shot noise variance is proportional to the LO power, we use a photodiode (PD) to monitor the LO at Bob’s side which is transmitted through the insecure quantum channel and it could be manipulated by a potential eavesdropper. In addition, a recent robust shot noise measurement scheme 23 can also be employed in our experiment to prevent some attacks targeting the shot noise, such as LO fluctuation attacks 24 and LO calibration attacks 25 26 . The potential risk of other attacks can also be resisted by additionally inserting optical devices.…”
Section: Resultsmentioning
confidence: 99%
“…Since the shot noise variance is proportional to the LO power, we use a photodiode (PD) to monitor the LO at Bob’s side which is transmitted through the insecure quantum channel and it could be manipulated by a potential eavesdropper. In addition, a recent robust shot noise measurement scheme 23 can also be employed in our experiment to prevent some attacks targeting the shot noise, such as LO fluctuation attacks 24 and LO calibration attacks 25 26 . The potential risk of other attacks can also be resisted by additionally inserting optical devices.…”
Section: Resultsmentioning
confidence: 99%
“…This way, the actual slope of the response curve will be decreased, then if Bob still employs the original response curve to evaluate the SNU, the SNU will be overestimated, which further will lead to the underestimate of the excess noise. Also, attack against the intensity of the LO [28] during the key distribution stage can also cause the misestimate of the SNU, the noise induced by Eve's attack may be underestimated if Bob applies the calibrated SNU to normalise its data. Thus a security loophole may be turned on.…”
Section: Limitations With the Conventional Calibrationmentioning
confidence: 99%
“…And since the SNU is not measured directly, it will certainly bring in more inaccuracy. Notwithstanding, such calibration scheme can open security loopholes that the eavesdropper Eve can utilize to procure the key information [28,29]. Eve can take actions to change the SNU during the key distribution procedure, then the SNU used to normalize the measured quadratures will not be the same as the real SNU, in this way Alice and Bob are prone to underestimate the channel excess noise that further threats the security of the CV-QKD system.…”
Section: Introductionmentioning
confidence: 99%
“…Wavelength dependent beamsplitter attacks targeting CVQKD schemes using heterodyne detection have recently been studied [10,11]. Finally, attacks specific to CVQKD [12,13] typically involve manipulation of the power of the local oscillator, which is the phase reference classical signal required for the coherent detection and is usually sent from Alice to Bob together with the quantum signal [14].…”
Section: Introductionmentioning
confidence: 99%