2020
DOI: 10.1364/oe.397962
|View full text |Cite
|
Sign up to set email alerts
|

Hacking single-photon avalanche detectors in quantum key distribution via pulse illumination

Abstract: Quantum key distribution (QKD) has been proved to be information-theoretically secure in theory. Unfortunately, the imperfect devices in practice compromise its security. Thus, to improve the security property of practical QKD systems, a commonly used method is to patch the loopholes in the existing QKD systems. However, in this work, we show an adversary’s capability of exploiting the imperfection of the patch itself to bypass the patch. Specifically, we experimentally demonstrate that, in the detector under … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 43 publications
0
16
0
Order By: Relevance
“…brightlight attack, it may be bypassed by a group of blinding pulses that are used in the pulse illumination attack. Specifically, a group of blinding pulses accumulatively introduces a high photocurrent may be averaged before sensing by a photocurrent monitor [30]. Thus, the instant high photocurrent may lower the bais voltage across the APD to blind the SD APD detector.…”
Section: Discussionmentioning
confidence: 99%
“…brightlight attack, it may be bypassed by a group of blinding pulses that are used in the pulse illumination attack. Specifically, a group of blinding pulses accumulatively introduces a high photocurrent may be averaged before sensing by a photocurrent monitor [30]. Thus, the instant high photocurrent may lower the bais voltage across the APD to blind the SD APD detector.…”
Section: Discussionmentioning
confidence: 99%
“…For example, the typical DCP value for id210 and id230 photodetectors is 40 and 50 Hz, respectively [ 18 , 19 ]. Such photodetectors are used in the Clavis 2 and Clavis 3 QKDS [ 20 , 21 , 22 , 23 , 24 ]. We applied the real characteristics of the id230 photodetector to our calculations (see Figure 10 ).…”
Section: Single-photon Synchronization Methodsmentioning
confidence: 99%
“…Another typical time-related attack is the dead-time attack [52]. Instead of tampering the signal state, Eve sends a faked state with multiple photons, for example |− in Figure 9a By tailoring the intensity of the faked state, Eve also can control the information bit via the blinding attack [26,55,56]. Specifically, Eve first applies a strong continuous wave or pulsed light to transfer the SPD from the Geiger mode to the linear mode, then the SPD is no longer sensitive to a single photon.…”
Section: Decodermentioning
confidence: 99%
“…By tailoring the intensity of the faked state, Eve also can control the information bit via the blinding attack [ 26 , 55 , 56 ]. Specifically, Eve first applies a strong continuous wave or pulsed light to transfer the SPD from the Geiger mode to the linear mode, then the SPD is no longer sensitive to a single photon.…”
Section: Quantum Hackingmentioning
confidence: 99%
See 1 more Smart Citation