Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Effects of detector efficiency mismatch on security of quantum cryptosystems

Journal Article · · Physical Review. A
 [1];  [2];  [1]
  1. Department of Electronics and Telecommunications, Norwegian University of Science and Technology, NO-7491 Trondheim (Norway)
  2. Radiophysics Department, St. Petersburg State Polytechnic University, Politechnicheskaya street 29, 195251 St. Petersburg (Russian Federation)
We suggest a type of attack on quantum cryptosystems that exploits variations in detector efficiency as a function of a control parameter accessible to an eavesdropper. With gated single-photon detectors, this control parameter can be the timing of the incoming pulse. When the eavesdropper sends short pulses using the appropriate timing so that the two gated detectors in Bob's setup have different efficiencies, the security of quantum key distribution can be compromised. Specifically, we show for the Bennett-Brassard 1984 (BB84) protocol that if the efficiency mismatch between 0 and 1 detectors for some value of the control parameter gets large enough (roughly 15:1 or larger), Eve can construct a successful faked-states attack causing a quantum bit error rate lower than 11%. We also derive a general security bound as a function of the detector sensitivity mismatch for the BB84 protocol. Experimental data for two different detectors are presented, and protection measures against this attack are discussed.
OSTI ID:
20853030
Journal Information:
Physical Review. A, Journal Name: Physical Review. A Journal Issue: 2 Vol. 74; ISSN 1050-2947; ISSN PLRAAN
Country of Publication:
United States
Language:
English

Similar Records

Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography
Journal Article · Thu Mar 31 23:00:00 EST 2005 · Physical Review. A · OSTI ID:20653273

Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel
Journal Article · Sat Oct 15 00:00:00 EDT 2011 · Physical Review. A · OSTI ID:22080383

Security of two quantum cryptography protocols using the same four qubit states
Journal Article · Thu Sep 15 00:00:00 EDT 2005 · Physical Review. A · OSTI ID:20718487