skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Trustworthiness of detectors in quantum key distribution with untrusted detectors

Journal Article · · Physical Review A - Atomic, Molecular, and Optical Physics
 [1]
  1. Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Computational Sciences and Engineering Division; Univ. of Tennessee, Knoxville, TN (United States). Dept. of Physics and Astronomy

Measurement-device-independent quantum key distribution (MDI-QKD) protocol has been demonstrated as a viable solution to detector side-channel attacks. One of the main advantages of MDI-QKD is that the security can be proved without making any assumptions about how the measurement device works. The price to pay is the relatively low secure key rate comparing with conventional quantum key distribution (QKD), such as the decoy-state BB84 protocol. Recently a new QKD protocol, aiming at bridging the strong security of MDI-QKD with the high e ciency of conventional QKD, has been proposed. In this protocol, the legitimate receiver employs a trusted linear optics network to encode information on photons received from an insecure quantum channel, and then performs a Bell state measurement (BSM) using untrusted detectors. One crucial assumption made in most of these studies is that the untrusted BSM located inside the receiver's laboratory cannot send any unwanted information to the outside. Here in this paper, we show that if the BSM is completely untrusted, a simple scheme would allow the BSM to send information to the outside. Combined with Trojan horse attacks, this scheme could allow Eve to gain information of the quantum key without being detected. Ultimately, to prevent the above attack, either countermeasures to Trojan horse attacks or some trustworthiness to the "untrusted" BSM device is required.

Research Organization:
Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)
Sponsoring Organization:
USDOE
Grant/Contract Number:
AC05-00OR22725
OSTI ID:
1185855
Alternate ID(s):
OSTI ID: 1181270
Journal Information:
Physical Review A - Atomic, Molecular, and Optical Physics, Vol. 91, Issue 2; ISSN 1050-2947
Publisher:
American Physical Society (APS)Copyright Statement
Country of Publication:
United States
Language:
English
Citation Metrics:
Cited by: 13 works
Citation information provided by
Web of Science

References (46)

Quantum cryptography based on Bell’s theorem journal August 1991
Quantum cryptography journal March 2002
The security of practical quantum key distribution journal September 2009
Secure quantum key distribution journal July 2014
Unconditional security in quantum cryptography journal May 2001
Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances journal March 1999
Simple Proof of Security of the BB84 Quantum Key Distribution Protocol journal July 2000
Faked states attack on quantum cryptosystems journal March 2005
Effects of detector efficiency mismatch on security of quantum cryptosystems journal August 2006
Thermal blinding of gated detectors in quantum cryptography journal January 2010
After-gate attack on a quantum cryptosystem journal January 2011
Full-field implementation of a perfect eavesdropper on a quantum cryptography system journal June 2011
Detector dead-time effects and paralyzability in high-speed quantum key distribution journal September 2007
Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors journal July 2011
Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources journal December 2011
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems journal October 2008
Hacking commercial quantum cryptography systems by tailored bright illumination journal August 2010
Phase-remapping attack in practical quantum-key-distribution systems journal March 2007
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system journal November 2010
Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system journal June 2011
Source attack of decoy-state quantum key distribution using phase information journal August 2013
Device-Independent Security of Quantum Cryptography against Collective Attacks journal June 2007
Proposal for Implementing Device-Independent Quantum Key Distribution Based on a Heralded Qubit Amplifier journal August 2010
Measurement-Device-Independent Quantum Key Distribution journal March 2012
Side-Channel-Free Quantum Key Distribution journal March 2012
Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw journal April 2012
Alternative schemes for measurement-device-independent quantum key distribution journal December 2012
Finite-key analysis for measurement-device-independent quantum key distribution journal August 2012
Practical decoy-state measurement-device-independent quantum key distribution journal May 2013
Long distance measurement-device-independent quantum key distribution with entangled photon sources journal August 2013
Finite-key analysis for measurement-device-independent quantum key distribution journal April 2014
Real-World Two-Photon Interference and Proof-of-Principle Quantum Key Distribution Immune to Detector Attacks journal September 2013
Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits journal November 2013
Experimental Measurement-Device-Independent Quantum Key Distribution journal September 2013
Experimental Demonstration of Polarization Encoding Measurement-Device-Independent Quantum Key Distribution journal May 2014
Measurement-Device-Independent Quantum Key Distribution over 200 km journal November 2014
Measurement-Device-Independent Quantum Cryptography journal May 2015
Detector-device-independent quantum key distribution journal December 2014
Quantum cryptographic network based on quantum memories journal October 1996
Security of Practical Time-Reversed EPR Quantum Key Distribution journal November 2002
Single-photon two-qubit entangled states: Preparation and measurement journal April 2003
Trojan-horse attacks on quantum-key-distribution systems journal February 2006
Trojan-horse attacks threaten the security of practical quantum cryptography journal December 2014
Risk Analysis of Trojan-Horse Attacks on Practical Quantum Key Distribution Systems journal May 2015
Memory Attacks on Device-Independent Quantum Cryptography journal January 2013
Safeguarding Quantum Key Distribution Through Detection Randomization journal May 2015

Cited By (2)

Practical challenges in quantum key distribution journal November 2016
Efficient High-Dimensional Quantum Key Distribution with Hybrid Encoding journal January 2019

Similar Records

Phase-remapping attack in practical quantum-key-distribution systems
Journal Article · Thu Mar 15 00:00:00 EDT 2007 · Physical Review. A · OSTI ID:1185855

Polarization-based plug-and-play measurement-device-independent quantum key distribution
Journal Article · Tue Jan 15 00:00:00 EST 2019 · Optical and Quantum Electronics · OSTI ID:1185855

Quantum key distribution with dual detectors
Journal Article · Tue May 15 00:00:00 EDT 2007 · Physical Review. A · OSTI ID:1185855