2019
DOI: 10.1038/s41598-019-54249-0
|View full text |Cite
|
Sign up to set email alerts
|

Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution

Abstract: By manipulating the reference pulses amplitude, a security vulnerability is caused by self-reference continuous-variable quantum key distribution. In this paper, we formalize an attack strategy for reference pulses, showing that the proposed attack can compromise the practical security of CVQKD protocol. In this scheme, before the beam splitter attack, Eve intercepts the reference pulses emitted by Alice, using Bayesian algorithm to estimate phase shifts. Subsequently, other reference pulses are re-prepared an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 52 publications
0
8
0
Order By: Relevance
“…3b) systems under different phase attacks versus the transmission distance. We set the modulation variance of GM to 18.9 based on the experiment in [23], and 0.1 for 4-state. We assumed the phase noise of quantum channel is normally distributed with variance 0.0001 rad 2 , and that of Eve's phase attack is normally distributed with variance and (rad 2 ).…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…3b) systems under different phase attacks versus the transmission distance. We set the modulation variance of GM to 18.9 based on the experiment in [23], and 0.1 for 4-state. We assumed the phase noise of quantum channel is normally distributed with variance 0.0001 rad 2 , and that of Eve's phase attack is normally distributed with variance and (rad 2 ).…”
Section: Resultsmentioning
confidence: 99%
“…If eavesdroppers manipulate these reference pulses, the phase information carried by them becomes unreliable, and the phase compensation for coherent detection becomes imperfect. The imperfect phase compensation reduces the security of the CVQKD scheme [20,23].…”
Section: B Eve's Phase Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…Despite their intuitive appeal over LO schemes, attack strategies against LLO schemes do exist. In one such attack recently proposed, 69 Eve intercepts the reference pulse and estimates the phase drift using Bayesian algorithms. Consequently, the excess noise is biased to mask an intercept-resend attack and a beam-splitter attack.…”
Section: Local Local Oscillatorsmentioning
confidence: 99%