2020
DOI: 10.1103/physreva.101.062320
|View full text |Cite
|
Sign up to set email alerts
|

Hidden-Markov-model-based calibration-attack recognition for continuous-variable quantum key distribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

5
4

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 34 publications
0
8
0
Order By: Relevance
“…The other typical attack is the calibration attack. A hidden Markov-model (HMM) was utilized to detect the calibration attack in real CV systems by Mao et al [42].…”
Section: Countermeasures On a Targeted Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…The other typical attack is the calibration attack. A hidden Markov-model (HMM) was utilized to detect the calibration attack in real CV systems by Mao et al [42].…”
Section: Countermeasures On a Targeted Attackmentioning
confidence: 99%
“…After analysis, Mao et al [42] found that the variation of the measured quadrature values reflected whether the calibration attack was performed. However, Bob's measurement values are affected by environmental disturbances, the drawbacks of devices Normally, a well-trained HMM will output a high probability value for normal data and a low probability value for attacked data.…”
Section: Countermeasures On a Targeted Attackmentioning
confidence: 99%
“…Thus it is necessary to detect multiple attacks. The quantum attack can be detected by some machine learning strategies, such as k-nearest neighbors (KNN) [25], support vector machines (SVM) [26], ensemble learning [27], hidden Markov models (HMM) [28], and neural networks (NN) [29,30]. These strategies can automatically detect and classify some known attacks by learning feature distribution instead of simple thresholds; however, there is also a drawback: the previous detection scheme was to select the one with the highest probability from different types of attacks without considering the coexistence of multiple attacks in practice.…”
Section: Introductionmentioning
confidence: 99%
“…The calibration attack may be implemented by modifying the shape of the local oscillator (LO) pulse [24]. Consequently, several countermeasures have been proposed to counteract the effects of the LO calibration attack and the wavelength attacks [25][26][27].…”
Section: Introductionmentioning
confidence: 99%