Chin. Phys. Lett.  2011, Vol. 28 Issue (7): 070304    DOI: 10.1088/0256-307X/28/7/070304
GENERAL |
Feasibility of Double-Click Attack on a Passive Detection Quantum Key Distribution System
ZHANG Peng1**, LI Chao1,2
1 Department of Mathematics and System Science, Science College, National University of Defense Technology, Changsha 410073
2State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190
Cite this article:   
ZHANG Peng, LI Chao 2011 Chin. Phys. Lett. 28 070304
Download: PDF(489KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract An eavesdropper (Eve) can exploit all the imperfections of a practical quantum key distribution (QKD) system to obtain some information about the secret key, no matter whether these imperfections are from the physical layer or from the post-processing layer. We propose a possible attack on a passive detection QKD system based on the imperfection from the software layer. The analysis shows that Eve can obtain all the information about the key without being discovered.
Keywords: 03.67.Dd      03.67.Hk     
Received: 12 January 2011      Published: 29 June 2011
PACS:  03.67.Dd (Quantum cryptography and communication security)  
  03.67.Hk (Quantum communication)  
TRENDMD:   
URL:  
https://cpl.iphy.ac.cn/10.1088/0256-307X/28/7/070304       OR      https://cpl.iphy.ac.cn/Y2011/V28/I7/070304
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
ZHANG Peng
LI Chao
[1] Bennett C H and Brassard G 1984 Proc. IEEE International Conference on Computers, Systems and Signal Processing (Bangalore India 9–12 December 1984) p 175
[2] Shor P W and Preskill J 2000 Phys. Rev. Lett. 85 441
[3] Lo H K and Chau H F 1999 Science 283 2050
[4] Gottesman D, Lo H K, Lütkenhaus N and Preskill J 2004 Quantum Inf. Comput. 4 325
[5] Inamori H, Lütkenhaus N and Mayers D 2007 Eur. Phys. J. D 41 599
[6] Gisin N, Fasel S, Kraus B, Zbinden H and Ribordy G 2006 Phys. Rev. A 73 022320
[7] Makarov V and Skaar J 2008 Quant. Inf. Comput. 8 0622
[8] Qi B, Fung C H F, Lo H K and Ma X F 2007 Quant. Inf. Comput. 7 73
[9] Zhao Y, Fung C H F, Qi B and Lo H K 2008 Phys. Rev. A 78 042333
[10] Lamas-Linares A and Kurtsiefer C 2007 Opt. Express 15 9388
[11] Fung C H F, Qi B, Tamaki K and Lo H K 2007 Phys. Rev. A 75 032314
[12] Xu F H, Qi B and Lo H K 2010 New J. Phys. 12 113026
[13] Makarov V 2009 New J. Phys. 11 065003
[14] Makarov V, Anisimov A and Sauge S arXiv:quant-ph/0809.3408
[15] Lydersen L, Wiechers C, Wittmann C, Elser D, Skaar J and Makarov V 2010 Nature photonics 4 686
Related articles from Frontiers Journals
[1] 天琦 窦,吉鹏 王,振华 李,文秀 屈,舜禹 杨,钟齐 孙,芬 周,雁鑫 韩,雨晴 黄,海强 马. A Fully Symmetrical Quantum Key Distribution System Capable of Preparing and Measuring Quantum States*

Supported by the Fundamental Research Funds for the Central Universities (Grant No. 2019XD-A02), and the State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications (Grant No. IPO2019ZT06).

[J]. Chin. Phys. Lett., 2020, 37(11): 070304
[2] GUO Yu, LUO Xiao-Bing. Quantum Teleportation between Two Distant Bose–Einstein Condensates[J]. Chin. Phys. Lett., 2012, 29(6): 070304
[3] Chang Ho Hong,Jin O Heo,Jong in Lim,Hyung jin Yang,**. A Quantum Network System of QSS-QDC Using χ-Type Entangled States[J]. Chin. Phys. Lett., 2012, 29(5): 070304
[4] Piotr Zawadzki**. New View of Ping-Pong Protocol Security[J]. Chin. Phys. Lett., 2012, 29(1): 070304
[5] WANG Chuan, **, HAO Liang, ZHAO Lian-Jie . Implementation of Quantum Private Queries Using Nuclear Magnetic Resonance[J]. Chin. Phys. Lett., 2011, 28(8): 070304
[6] YAN Hui, **, ZHU Shi-Liang, DU Sheng-Wang . Efficient Phase-Encoding Quantum Key Generation with Narrow-Band Single Photons[J]. Chin. Phys. Lett., 2011, 28(7): 070304
[7] WANG Xiao-Bo, WANG Jing-Jing, HE Bo, XIAO Lian-Tuan**, JIA Suo-Tang . Photon Counting Optical Time Domain Reflectometry Applying a Single Photon Modulation Technique[J]. Chin. Phys. Lett., 2011, 28(7): 070304
[8] WANG Mei-Yu, YAN Feng-Li** . Perfect Entanglement Teleportation via Two Parallel W State Channels[J]. Chin. Phys. Lett., 2011, 28(6): 070304
[9] SHI Run-Hua, **, HUANG Liu-Sheng, YANG Wei, ZHONG Hong . A Novel Multiparty Quantum Secret Sharing Scheme of Secure Direct Communication Based on Bell States and Bell Measurements[J]. Chin. Phys. Lett., 2011, 28(5): 070304
[10] SU Xiao-Qiang** . Entanglement Enhancement in an XY Spin Chain[J]. Chin. Phys. Lett., 2011, 28(5): 070304
[11] LI Hong-Rong**, LI Fu-Li, ZHU Shi-Yao . Quantum Nonlocally Correlated Observables for Non-Gaussian States[J]. Chin. Phys. Lett., 2011, 28(5): 070304
[12] HAN Jia-Jia, SUN Shi-Hai, LIANG Lin-Mei** . A Three-Node QKD Network Based on a Two-Way QKD System[J]. Chin. Phys. Lett., 2011, 28(4): 070304
[13] WANG Tie-Jun, , LI Tao, DU Fang-Fang, DENG Fu-Guo** . High-Capacity Quantum Secure Direct Communication Based on Quantum Hyperdense Coding with Hyperentanglement[J]. Chin. Phys. Lett., 2011, 28(4): 070304
[14] LIN Song, **, GAO Fei, LIU Xiao-Fen, . Quantum Secure Direct Communication with Five-Qubit Entangled State[J]. Chin. Phys. Lett., 2011, 28(3): 070304
[15] ZHA Xin-Wei**, MA Gang-Long . Classification of Four-Qubit States by Means of a Stochastic Local Operation and the Classical Communication Invariant[J]. Chin. Phys. Lett., 2011, 28(2): 070304
Viewed
Full text


Abstract