2020
DOI: 10.1364/optica.391325
|View full text |Cite
|
Sign up to set email alerts
|

Robust countermeasure against detector control attack in a practical quantum key distribution system: comment

Abstract: The physical imperfections of quantum key distribution systems compromise their information-theoretic security. By exploiting the imperfections on the detection unit, an eavesdropper can launch various detector-control attacks to steal the secret key. Recently, in Optica 6, 1178 (2019)OPTIC82334-253610.1364/OPTICA.6.001178 entitled “Robust countermeasure against detector control attack in a practical quantum key distribution system,” Qian et al. proposed a countermeasure usin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…Crafty adversaries can instead send instantaneous bright trigger light, which blinds the detector without disrupting the monitor [35,36]. Other solutions [40][41][42][43], such as randomly changing the attenuation in front of the detector and analyzing the corresponding detection events and errors, also increase the difficulty of experimental operation [44]. While experimental solutions attempt to judge whether the generator is under attack by designing a more sophisticated system, further advanced attacks from Eve usually cannot be avoided [44,45].…”
Section: Qrngsmentioning
confidence: 99%
See 1 more Smart Citation
“…Crafty adversaries can instead send instantaneous bright trigger light, which blinds the detector without disrupting the monitor [35,36]. Other solutions [40][41][42][43], such as randomly changing the attenuation in front of the detector and analyzing the corresponding detection events and errors, also increase the difficulty of experimental operation [44]. While experimental solutions attempt to judge whether the generator is under attack by designing a more sophisticated system, further advanced attacks from Eve usually cannot be avoided [44,45].…”
Section: Qrngsmentioning
confidence: 99%
“…Other solutions [40][41][42][43], such as randomly changing the attenuation in front of the detector and analyzing the corresponding detection events and errors, also increase the difficulty of experimental operation [44]. While experimental solutions attempt to judge whether the generator is under attack by designing a more sophisticated system, further advanced attacks from Eve usually cannot be avoided [44,45]. Therefore, it is vital to develop theoretical approaches that can fundamentally address detector blinding attacks.…”
Section: Qrngsmentioning
confidence: 99%
“…Crafty adversaries can instead send instantaneous bright trigger light, which blinds the detector without disrupting the monitor [35,36]. Other solutions [40][41][42][43], such as randomly changing the attenuation in front of the detector and analysing the corresponding detection events and errors, also increase the difficulty of experimental operation [44]. While experimental solutions attempt to judge whether the generator is under attack by designing a more sophisticated system, further advanced attacks from Eve usually cannot be avoided [44,45].…”
Section: Source Independence Device Independencementioning
confidence: 99%
“…Other solutions [40][41][42][43], such as randomly changing the attenuation in front of the detector and analysing the corresponding detection events and errors, also increase the difficulty of experimental operation [44]. While experimental solutions attempt to judge whether the generator is under attack by designing a more sophisticated system, further advanced attacks from Eve usually cannot be avoided [44,45]. Therefore, it is vital to develop theoretical approaches that can fundamentally address detector blinding attacks.…”
Section: Source Independence Device Independencementioning
confidence: 99%
“…This includes also observing the detector's count rates versus random variations of either the detection efficiency [52,53], or the attenuation in front of the detector [54]. These security patches could defeat the original attacks they were designed for, but unfortunately they fail against subsequent ad-hoc modified attacks [46,55].…”
Section: Introductionmentioning
confidence: 99%