2011
DOI: 10.1103/physreva.83.062331
|View full text |Cite
|
Sign up to set email alerts
|

Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system

Abstract: The Faraday mirror (FM) plays a very important role in maintaining the stability of two-way plug-and-play quantum key distribution (QKD) systems. However, the practical FM is imperfect, which will not only introduce an additional quantum bit error rate (QBER) but also leave a loophole for Eve to spy the secret key. In this paper we propose a passive Faraday mirror attack in two-way QKD system based on the imperfection of FM. Our analysis shows that if the FM is imperfect, the dimension of Hilbert space spanned… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
51
0
2

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 79 publications
(53 citation statements)
references
References 24 publications
(56 reference statements)
0
51
0
2
Order By: Relevance
“…First, the plug-and-play MDI-QKD is vulnerable to various source attacks [6,7,9] since the signal source is totally controlled by an untrusted server. By keeping a few assumptions including the single-mode assumption, the phase-randomization assumption, and the trust of the monitoring devices, a complete security analysis for plug-and-play MDI-QKD was derived in Ref.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…First, the plug-and-play MDI-QKD is vulnerable to various source attacks [6,7,9] since the signal source is totally controlled by an untrusted server. By keeping a few assumptions including the single-mode assumption, the phase-randomization assumption, and the trust of the monitoring devices, a complete security analysis for plug-and-play MDI-QKD was derived in Ref.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…The third approach is the measurement-device-independent QKD (MDI-QKD) [16], which removes all detection-related security loopholes. Such a loophole is arguably the most important issue identified in conventional QKD implementations [7][8][9][10]. Therefore, MDI-QKD is of great importance to promote the security of practical QKD systems.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Such theory-practice deviations usually arise due to technical deficiencies and operational imperfections in the system hardware or firmware. The field of quantum hacking investigates such deviations [4][5][6] and many proof-of-principle quantum hacking attacks have been devised and performed on practical QKD systems in the last decade [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21].…”
mentioning
confidence: 99%