2016
DOI: 10.1103/physreva.94.012325
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: We identify and study a new security loophole in continuous-variable quantum key distribution (CV-QKD) implementations, related to the imperfect linearity of the homodyne detector. By exploiting this loophole, we propose an active side-channel attack on the Gaussian-modulated coherent state CV-QKD protocol combining an intercept-resend attack with an induced saturation of the homodyne detection on the receiver side (Bob). We show that an attacker can bias the excess noise estimation by displacing the quadratur… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
63
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 100 publications
(64 citation statements)
references
References 42 publications
0
63
0
1
Order By: Relevance
“…For examples, in calibration attack [19], Eve delays the LO pulse such that Alice and Bob overestimate the shot noise based on their pre-established calibration, which results in underestimation of the excess noise. In saturation attack [28,29], Eve induces saturation on Bob's HD measurement and directly bias Alice and Bob's excess noise. In this paper, we also follow this idea and will take advantage of several imperfections in a HD to archive a security breach on GMCS CV-QKD implementations.…”
Section: B Quantum Hacking In Cv-qkdmentioning
confidence: 99%
See 3 more Smart Citations
“…For examples, in calibration attack [19], Eve delays the LO pulse such that Alice and Bob overestimate the shot noise based on their pre-established calibration, which results in underestimation of the excess noise. In saturation attack [28,29], Eve induces saturation on Bob's HD measurement and directly bias Alice and Bob's excess noise. In this paper, we also follow this idea and will take advantage of several imperfections in a HD to archive a security breach on GMCS CV-QKD implementations.…”
Section: B Quantum Hacking In Cv-qkdmentioning
confidence: 99%
“…Beside the HD imbalance imperfection, finite linear detection range of the electronics part can also influence HD measurements and may lead to security loopholes [28,29]. An important assumption in CV-QKD is that Bob's HD measurement varies linearly with the input optical quadrature.…”
Section: A Practical Homodyne Detection With Imperfectionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Due to the imperfection of the detector in the practical CV-QKD system, Eve can implement quantum hacking attacks for CV detectors, such as the local oscillator calibration attack [19,20], the wavelength attack [21,22], the detector saturation attack [23]. These attacks use the detector's imperfect characteristics to operate the detector results to reduce the * zhangyc@bupt.edu.cn † yusong@bupt.edu.cn additional noise variance, so that Alice and Bob estimate the secret key rate too high, resulting in security risks.…”
Section: Introductionmentioning
confidence: 99%