Trustworthiness of detectors in quantum key distribution with untrusted detectors
Abstract
Measurement-device-independent quantum key distribution (MDI-QKD) protocol has been demonstrated as a viable solution to detector side-channel attacks. One of the main advantages of MDI-QKD is that the security can be proved without making any assumptions about how the measurement device works. The price to pay is the relatively low secure key rate comparing with conventional quantum key distribution (QKD), such as the decoy-state BB84 protocol. Recently a new QKD protocol, aiming at bridging the strong security of MDI-QKD with the high e ciency of conventional QKD, has been proposed. In this protocol, the legitimate receiver employs a trusted linear optics network to encode information on photons received from an insecure quantum channel, and then performs a Bell state measurement (BSM) using untrusted detectors. One crucial assumption made in most of these studies is that the untrusted BSM located inside the receiver's laboratory cannot send any unwanted information to the outside. Here in this paper, we show that if the BSM is completely untrusted, a simple scheme would allow the BSM to send information to the outside. Combined with Trojan horse attacks, this scheme could allow Eve to gain information of the quantum key without being detected. Ultimately, to prevent themore »
- Authors:
-
- Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Computational Sciences and Engineering Division; Univ. of Tennessee, Knoxville, TN (United States). Dept. of Physics and Astronomy
- Publication Date:
- Research Org.:
- Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 1185855
- Alternate Identifier(s):
- OSTI ID: 1181270
- Grant/Contract Number:
- AC05-00OR22725
- Resource Type:
- Accepted Manuscript
- Journal Name:
- Physical Review A - Atomic, Molecular, and Optical Physics
- Additional Journal Information:
- Journal Volume: 91; Journal Issue: 2; Journal ID: ISSN 1050-2947
- Publisher:
- American Physical Society (APS)
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 97 MATHEMATICS AND COMPUTING; 71 CLASSICAL AND QUANTUM MECHANICS, GENERAL PHYSICS
Citation Formats
Qi, Bing. Trustworthiness of detectors in quantum key distribution with untrusted detectors. United States: N. p., 2015.
Web. doi:10.1103/PhysRevA.91.020303.
Qi, Bing. Trustworthiness of detectors in quantum key distribution with untrusted detectors. United States. https://doi.org/10.1103/PhysRevA.91.020303
Qi, Bing. Wed .
"Trustworthiness of detectors in quantum key distribution with untrusted detectors". United States. https://doi.org/10.1103/PhysRevA.91.020303. https://www.osti.gov/servlets/purl/1185855.
@article{osti_1185855,
title = {Trustworthiness of detectors in quantum key distribution with untrusted detectors},
author = {Qi, Bing},
abstractNote = {Measurement-device-independent quantum key distribution (MDI-QKD) protocol has been demonstrated as a viable solution to detector side-channel attacks. One of the main advantages of MDI-QKD is that the security can be proved without making any assumptions about how the measurement device works. The price to pay is the relatively low secure key rate comparing with conventional quantum key distribution (QKD), such as the decoy-state BB84 protocol. Recently a new QKD protocol, aiming at bridging the strong security of MDI-QKD with the high e ciency of conventional QKD, has been proposed. In this protocol, the legitimate receiver employs a trusted linear optics network to encode information on photons received from an insecure quantum channel, and then performs a Bell state measurement (BSM) using untrusted detectors. One crucial assumption made in most of these studies is that the untrusted BSM located inside the receiver's laboratory cannot send any unwanted information to the outside. Here in this paper, we show that if the BSM is completely untrusted, a simple scheme would allow the BSM to send information to the outside. Combined with Trojan horse attacks, this scheme could allow Eve to gain information of the quantum key without being detected. Ultimately, to prevent the above attack, either countermeasures to Trojan horse attacks or some trustworthiness to the "untrusted" BSM device is required.},
doi = {10.1103/PhysRevA.91.020303},
journal = {Physical Review A - Atomic, Molecular, and Optical Physics},
number = 2,
volume = 91,
place = {United States},
year = {Wed Feb 25 00:00:00 EST 2015},
month = {Wed Feb 25 00:00:00 EST 2015}
}
Web of Science
Works referenced in this record:
Quantum cryptography based on Bell’s theorem
journal, August 1991
- Ekert, Artur K.
- Physical Review Letters, Vol. 67, Issue 6
Quantum cryptography
journal, March 2002
- Gisin, Nicolas; Ribordy, Grégoire; Tittel, Wolfgang
- Reviews of Modern Physics, Vol. 74, Issue 1
The security of practical quantum key distribution
journal, September 2009
- Scarani, Valerio; Bechmann-Pasquinucci, Helle; Cerf, Nicolas J.
- Reviews of Modern Physics, Vol. 81, Issue 3
Secure quantum key distribution
journal, July 2014
- Lo, Hoi-Kwong; Curty, Marcos; Tamaki, Kiyoshi
- Nature Photonics, Vol. 8, Issue 8
Unconditional security in quantum cryptography
journal, May 2001
- Mayers, Dominic
- Journal of the ACM, Vol. 48, Issue 3
Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances
journal, March 1999
- Lo, H.
- Science, Vol. 283, Issue 5410
Simple Proof of Security of the BB84 Quantum Key Distribution Protocol
journal, July 2000
- Shor, Peter W.; Preskill, John
- Physical Review Letters, Vol. 85, Issue 2
Faked states attack on quantum cryptosystems
journal, March 2005
- Makarov *, Vadim; Hjelme, Dag R.
- Journal of Modern Optics, Vol. 52, Issue 5
Effects of detector efficiency mismatch on security of quantum cryptosystems
journal, August 2006
- Makarov, Vadim; Anisimov, Andrey; Skaar, Johannes
- Physical Review A, Vol. 74, Issue 2
Thermal blinding of gated detectors in quantum cryptography
journal, January 2010
- Lydersen, Lars; Wiechers, Carlos; Wittmann, Christoffer
- Optics Express, Vol. 18, Issue 26
After-gate attack on a quantum cryptosystem
journal, January 2011
- Wiechers, C.; Lydersen, L.; Wittmann, C.
- New Journal of Physics, Vol. 13, Issue 1
Full-field implementation of a perfect eavesdropper on a quantum cryptography system
journal, June 2011
- Gerhardt, Ilja; Liu, Qin; Lamas-Linares, Antía
- Nature Communications, Vol. 2, Issue 1
Detector dead-time effects and paralyzability in high-speed quantum key distribution
journal, September 2007
- Rogers, Daniel J.; Bienfang, Joshua C.; Nakassis, Anastase
- New Journal of Physics, Vol. 9, Issue 9
Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors
journal, July 2011
- Weier, Henning; Krauss, Harald; Rau, Markus
- New Journal of Physics, Vol. 13, Issue 7
Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources
journal, December 2011
- Li, Hong-Wei; Wang, Shuang; Huang, Jing-Zheng
- Physical Review A, Vol. 84, Issue 6
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
journal, October 2008
- Zhao, Yi; Fung, Chi-Hang Fred; Qi, Bing
- Physical Review A, Vol. 78, Issue 4
Hacking commercial quantum cryptography systems by tailored bright illumination
journal, August 2010
- Lydersen, Lars; Wiechers, Carlos; Wittmann, Christoffer
- Nature Photonics, Vol. 4, Issue 10
Phase-remapping attack in practical quantum-key-distribution systems
journal, March 2007
- Fung, Chi-Hang Fred; Qi, Bing; Tamaki, Kiyoshi
- Physical Review A, Vol. 75, Issue 3
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
journal, November 2010
- Xu, Feihu; Qi, Bing; Lo, Hoi-Kwong
- New Journal of Physics, Vol. 12, Issue 11
Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system
journal, June 2011
- Sun, Shi-Hai; Jiang, Mu-Sheng; Liang, Lin-Mei
- Physical Review A, Vol. 83, Issue 6
Source attack of decoy-state quantum key distribution using phase information
journal, August 2013
- Tang, Yan-Lin; Yin, Hua-Lei; Ma, Xiongfeng
- Physical Review A, Vol. 88, Issue 2
Device-Independent Security of Quantum Cryptography against Collective Attacks
journal, June 2007
- Acín, Antonio; Brunner, Nicolas; Gisin, Nicolas
- Physical Review Letters, Vol. 98, Issue 23
Proposal for Implementing Device-Independent Quantum Key Distribution Based on a Heralded Qubit Amplifier
journal, August 2010
- Gisin, Nicolas; Pironio, Stefano; Sangouard, Nicolas
- Physical Review Letters, Vol. 105, Issue 7
Measurement-Device-Independent Quantum Key Distribution
journal, March 2012
- Lo, Hoi-Kwong; Curty, Marcos; Qi, Bing
- Physical Review Letters, Vol. 108, Issue 13
Side-Channel-Free Quantum Key Distribution
journal, March 2012
- Braunstein, Samuel L.; Pirandola, Stefano
- Physical Review Letters, Vol. 108, Issue 13
Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw
journal, April 2012
- Tamaki, Kiyoshi; Lo, Hoi-Kwong; Fung, Chi-Hang Fred
- Physical Review A, Vol. 85, Issue 4
Alternative schemes for measurement-device-independent quantum key distribution
journal, December 2012
- Ma, Xiongfeng; Razavi, Mohsen
- Physical Review A, Vol. 86, Issue 6
Finite-key analysis for measurement-device-independent quantum key distribution
journal, August 2012
- Song, Ting-Ting; Wen, Qiao-Yan; Guo, Fen-Zhuo
- Physical Review A, Vol. 86, Issue 2
Practical decoy-state measurement-device-independent quantum key distribution
journal, May 2013
- Sun, Shi-Hai; Gao, Ming; Li, Chun-Yan
- Physical Review A, Vol. 87, Issue 5
Long distance measurement-device-independent quantum key distribution with entangled photon sources
journal, August 2013
- Xu, Feihu; Qi, Bing; Liao, Zhongfa
- Applied Physics Letters, Vol. 103, Issue 6
Finite-key analysis for measurement-device-independent quantum key distribution
journal, April 2014
- Curty, Marcos; Xu, Feihu; Cui, Wei
- Nature Communications, Vol. 5, Issue 1
Real-World Two-Photon Interference and Proof-of-Principle Quantum Key Distribution Immune to Detector Attacks
journal, September 2013
- Rubenok, A.; Slater, J. A.; Chan, P.
- Physical Review Letters, Vol. 111, Issue 13
Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits
journal, November 2013
- Ferreira da Silva, T.; Vitoreti, D.; Xavier, G. B.
- Physical Review A, Vol. 88, Issue 5
Experimental Measurement-Device-Independent Quantum Key Distribution
journal, September 2013
- Liu, Yang; Chen, Teng-Yun; Wang, Liu-Jun
- Physical Review Letters, Vol. 111, Issue 13
Experimental Demonstration of Polarization Encoding Measurement-Device-Independent Quantum Key Distribution
journal, May 2014
- Tang, Zhiyuan; Liao, Zhongfa; Xu, Feihu
- Physical Review Letters, Vol. 112, Issue 19
Measurement-Device-Independent Quantum Key Distribution over 200 km
journal, November 2014
- Tang, Yan-Lin; Yin, Hua-Lei; Chen, Si-Jing
- Physical Review Letters, Vol. 113, Issue 19
Measurement-Device-Independent Quantum Cryptography
journal, May 2015
- Feihu Xu, ; Curty, Marcos
- IEEE Journal of Selected Topics in Quantum Electronics, Vol. 21, Issue 3
Detector-device-independent quantum key distribution
journal, December 2014
- Lim, Charles Ci Wen; Korzh, Boris; Martin, Anthony
- Applied Physics Letters, Vol. 105, Issue 22
Quantum cryptographic network based on quantum memories
journal, October 1996
- Biham, Eli; Huttner, Bruno; Mor, Tal
- Physical Review A, Vol. 54, Issue 4, p. 2651-2658
Security of Practical Time-Reversed EPR Quantum Key Distribution
journal, November 2002
- Not Available, Not Available
- Algorithmica, Vol. 34, Issue 4
Single-photon two-qubit entangled states: Preparation and measurement
journal, April 2003
- Kim, Yoon-Ho
- Physical Review A, Vol. 67, Issue 4
Trojan-horse attacks on quantum-key-distribution systems
journal, February 2006
- Gisin, N.; Fasel, S.; Kraus, B.
- Physical Review A, Vol. 73, Issue 2
Trojan-horse attacks threaten the security of practical quantum cryptography
journal, December 2014
- Jain, Nitin; Anisimova, Elena; Khan, Imran
- New Journal of Physics, Vol. 16, Issue 12
Risk Analysis of Trojan-Horse Attacks on Practical Quantum Key Distribution Systems
journal, May 2015
- Jain, Nitin; Stiller, Birgit; Khan, Imran
- IEEE Journal of Selected Topics in Quantum Electronics, Vol. 21, Issue 3
Memory Attacks on Device-Independent Quantum Cryptography
journal, January 2013
- Barrett, Jonathan; Colbeck, Roger; Kent, Adrian
- Physical Review Letters, Vol. 110, Issue 1
Safeguarding Quantum Key Distribution Through Detection Randomization
journal, May 2015
- Ferreira da Silva, Thiago; do Amaral, Gustavo C.; Xavier, Guilherme B.
- IEEE Journal of Selected Topics in Quantum Electronics, Vol. 21, Issue 3
Works referencing / citing this record:
Practical challenges in quantum key distribution
journal, November 2016
- Diamanti, Eleni; Lo, Hoi-Kwong; Qi, Bing
- npj Quantum Information, Vol. 2, Issue 1
Efficient High-Dimensional Quantum Key Distribution with Hybrid Encoding
journal, January 2019
- Jo, Yonggi; Park, Hee; Lee, Seung-Woo
- Entropy, Vol. 21, Issue 1