Feasibility of Double-Click Attack on a Passive Detection Quantum Key Distribution System
ZHANG Peng1**, LI Chao1,2
1 Department of Mathematics and System Science, Science College, National University of Defense Technology, Changsha 410073 2State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190
Feasibility of Double-Click Attack on a Passive Detection Quantum Key Distribution System
ZHANG Peng1**, LI Chao1,2
1 Department of Mathematics and System Science, Science College, National University of Defense Technology, Changsha 410073 2State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190
摘要An eavesdropper (Eve) can exploit all the imperfections of a practical quantum key distribution (QKD) system to obtain some information about the secret key, no matter whether these imperfections are from the physical layer or from the post-processing layer. We propose a possible attack on a passive detection QKD system based on the imperfection from the software layer. The analysis shows that Eve can obtain all the information about the key without being discovered.
Abstract:An eavesdropper (Eve) can exploit all the imperfections of a practical quantum key distribution (QKD) system to obtain some information about the secret key, no matter whether these imperfections are from the physical layer or from the post-processing layer. We propose a possible attack on a passive detection QKD system based on the imperfection from the software layer. The analysis shows that Eve can obtain all the information about the key without being discovered.
ZHANG Peng**;LI Chao;
. Feasibility of Double-Click Attack on a Passive Detection Quantum Key Distribution System[J]. 中国物理快报, 2011, 28(7): 70304-070304.
ZHANG Peng**, LI Chao,
. Feasibility of Double-Click Attack on a Passive Detection Quantum Key Distribution System. Chin. Phys. Lett., 2011, 28(7): 70304-070304.
[1] Bennett C H and Brassard G 1984 Proc. IEEE International Conference on Computers, Systems and Signal Processing (Bangalore India 9–12 December 1984) p 175
[2] Shor P W and Preskill J 2000 Phys. Rev. Lett. 85 441
[3] Lo H K and Chau H F 1999 Science 283 2050
[4] Gottesman D, Lo H K, Lütkenhaus N and Preskill J 2004 Quantum Inf. Comput. 4 325
[5] Inamori H, Lütkenhaus N and Mayers D 2007 Eur. Phys. J. D 41 599
[6] Gisin N, Fasel S, Kraus B, Zbinden H and Ribordy G 2006 Phys. Rev. A 73 022320
[7] Makarov V and Skaar J 2008 Quant. Inf. Comput. 8 0622
[8] Qi B, Fung C H F, Lo H K and Ma X F 2007 Quant. Inf. Comput. 7 73
[9] Zhao Y, Fung C H F, Qi B and Lo H K 2008 Phys. Rev. A 78 042333
[10] Lamas-Linares A and Kurtsiefer C 2007 Opt. Express 15 9388
[11] Fung C H F, Qi B, Tamaki K and Lo H K 2007 Phys. Rev. A 75 032314
[12] Xu F H, Qi B and Lo H K 2010 New J. Phys. 12 113026
[13] Makarov V 2009 New J. Phys. 11 065003
[14] Makarov V, Anisimov A and Sauge S arXiv:quant-ph/0809.3408
[15] Lydersen L, Wiechers C, Wittmann C, Elser D, Skaar J and Makarov V 2010 Nature photonics 4 686