DOE PAGES title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Trustworthiness of detectors in quantum key distribution with untrusted detectors

Abstract

Measurement-device-independent quantum key distribution (MDI-QKD) protocol has been demonstrated as a viable solution to detector side-channel attacks. One of the main advantages of MDI-QKD is that the security can be proved without making any assumptions about how the measurement device works. The price to pay is the relatively low secure key rate comparing with conventional quantum key distribution (QKD), such as the decoy-state BB84 protocol. Recently a new QKD protocol, aiming at bridging the strong security of MDI-QKD with the high e ciency of conventional QKD, has been proposed. In this protocol, the legitimate receiver employs a trusted linear optics network to encode information on photons received from an insecure quantum channel, and then performs a Bell state measurement (BSM) using untrusted detectors. One crucial assumption made in most of these studies is that the untrusted BSM located inside the receiver's laboratory cannot send any unwanted information to the outside. Here in this paper, we show that if the BSM is completely untrusted, a simple scheme would allow the BSM to send information to the outside. Combined with Trojan horse attacks, this scheme could allow Eve to gain information of the quantum key without being detected. Ultimately, to prevent themore » above attack, either countermeasures to Trojan horse attacks or some trustworthiness to the "untrusted" BSM device is required.« less

Authors:
 [1]
  1. Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States). Computational Sciences and Engineering Division; Univ. of Tennessee, Knoxville, TN (United States). Dept. of Physics and Astronomy
Publication Date:
Research Org.:
Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1185855
Alternate Identifier(s):
OSTI ID: 1181270
Grant/Contract Number:  
AC05-00OR22725
Resource Type:
Accepted Manuscript
Journal Name:
Physical Review A - Atomic, Molecular, and Optical Physics
Additional Journal Information:
Journal Volume: 91; Journal Issue: 2; Journal ID: ISSN 1050-2947
Publisher:
American Physical Society (APS)
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING; 71 CLASSICAL AND QUANTUM MECHANICS, GENERAL PHYSICS

Citation Formats

Qi, Bing. Trustworthiness of detectors in quantum key distribution with untrusted detectors. United States: N. p., 2015. Web. doi:10.1103/PhysRevA.91.020303.
Qi, Bing. Trustworthiness of detectors in quantum key distribution with untrusted detectors. United States. https://doi.org/10.1103/PhysRevA.91.020303
Qi, Bing. Wed . "Trustworthiness of detectors in quantum key distribution with untrusted detectors". United States. https://doi.org/10.1103/PhysRevA.91.020303. https://www.osti.gov/servlets/purl/1185855.
@article{osti_1185855,
title = {Trustworthiness of detectors in quantum key distribution with untrusted detectors},
author = {Qi, Bing},
abstractNote = {Measurement-device-independent quantum key distribution (MDI-QKD) protocol has been demonstrated as a viable solution to detector side-channel attacks. One of the main advantages of MDI-QKD is that the security can be proved without making any assumptions about how the measurement device works. The price to pay is the relatively low secure key rate comparing with conventional quantum key distribution (QKD), such as the decoy-state BB84 protocol. Recently a new QKD protocol, aiming at bridging the strong security of MDI-QKD with the high e ciency of conventional QKD, has been proposed. In this protocol, the legitimate receiver employs a trusted linear optics network to encode information on photons received from an insecure quantum channel, and then performs a Bell state measurement (BSM) using untrusted detectors. One crucial assumption made in most of these studies is that the untrusted BSM located inside the receiver's laboratory cannot send any unwanted information to the outside. Here in this paper, we show that if the BSM is completely untrusted, a simple scheme would allow the BSM to send information to the outside. Combined with Trojan horse attacks, this scheme could allow Eve to gain information of the quantum key without being detected. Ultimately, to prevent the above attack, either countermeasures to Trojan horse attacks or some trustworthiness to the "untrusted" BSM device is required.},
doi = {10.1103/PhysRevA.91.020303},
journal = {Physical Review A - Atomic, Molecular, and Optical Physics},
number = 2,
volume = 91,
place = {United States},
year = {Wed Feb 25 00:00:00 EST 2015},
month = {Wed Feb 25 00:00:00 EST 2015}
}

Journal Article:

Citation Metrics:
Cited by: 13 works
Citation information provided by
Web of Science

Save / Share:

Works referenced in this record:

Quantum cryptography based on Bell’s theorem
journal, August 1991


Quantum cryptography
journal, March 2002

  • Gisin, Nicolas; Ribordy, Grégoire; Tittel, Wolfgang
  • Reviews of Modern Physics, Vol. 74, Issue 1
  • DOI: 10.1103/RevModPhys.74.145

The security of practical quantum key distribution
journal, September 2009

  • Scarani, Valerio; Bechmann-Pasquinucci, Helle; Cerf, Nicolas J.
  • Reviews of Modern Physics, Vol. 81, Issue 3
  • DOI: 10.1103/RevModPhys.81.1301

Secure quantum key distribution
journal, July 2014


Unconditional security in quantum cryptography
journal, May 2001


Simple Proof of Security of the BB84 Quantum Key Distribution Protocol
journal, July 2000


Faked states attack on quantum cryptosystems
journal, March 2005


Effects of detector efficiency mismatch on security of quantum cryptosystems
journal, August 2006


Thermal blinding of gated detectors in quantum cryptography
journal, January 2010

  • Lydersen, Lars; Wiechers, Carlos; Wittmann, Christoffer
  • Optics Express, Vol. 18, Issue 26
  • DOI: 10.1364/OE.18.027938

After-gate attack on a quantum cryptosystem
journal, January 2011


Full-field implementation of a perfect eavesdropper on a quantum cryptography system
journal, June 2011

  • Gerhardt, Ilja; Liu, Qin; Lamas-Linares, Antía
  • Nature Communications, Vol. 2, Issue 1
  • DOI: 10.1038/ncomms1348

Detector dead-time effects and paralyzability in high-speed quantum key distribution
journal, September 2007

  • Rogers, Daniel J.; Bienfang, Joshua C.; Nakassis, Anastase
  • New Journal of Physics, Vol. 9, Issue 9
  • DOI: 10.1088/1367-2630/9/9/319

Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors
journal, July 2011


Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources
journal, December 2011


Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
journal, October 2008


Hacking commercial quantum cryptography systems by tailored bright illumination
journal, August 2010

  • Lydersen, Lars; Wiechers, Carlos; Wittmann, Christoffer
  • Nature Photonics, Vol. 4, Issue 10
  • DOI: 10.1038/nphoton.2010.214

Phase-remapping attack in practical quantum-key-distribution systems
journal, March 2007


Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
journal, November 2010


Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system
journal, June 2011


Source attack of decoy-state quantum key distribution using phase information
journal, August 2013


Device-Independent Security of Quantum Cryptography against Collective Attacks
journal, June 2007


Proposal for Implementing Device-Independent Quantum Key Distribution Based on a Heralded Qubit Amplifier
journal, August 2010


Measurement-Device-Independent Quantum Key Distribution
journal, March 2012


Side-Channel-Free Quantum Key Distribution
journal, March 2012


Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw
journal, April 2012


Alternative schemes for measurement-device-independent quantum key distribution
journal, December 2012


Finite-key analysis for measurement-device-independent quantum key distribution
journal, August 2012


Practical decoy-state measurement-device-independent quantum key distribution
journal, May 2013


Long distance measurement-device-independent quantum key distribution with entangled photon sources
journal, August 2013

  • Xu, Feihu; Qi, Bing; Liao, Zhongfa
  • Applied Physics Letters, Vol. 103, Issue 6
  • DOI: 10.1063/1.4817672

Finite-key analysis for measurement-device-independent quantum key distribution
journal, April 2014

  • Curty, Marcos; Xu, Feihu; Cui, Wei
  • Nature Communications, Vol. 5, Issue 1
  • DOI: 10.1038/ncomms4732

Real-World Two-Photon Interference and Proof-of-Principle Quantum Key Distribution Immune to Detector Attacks
journal, September 2013


Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits
journal, November 2013


Experimental Measurement-Device-Independent Quantum Key Distribution
journal, September 2013


Experimental Demonstration of Polarization Encoding Measurement-Device-Independent Quantum Key Distribution
journal, May 2014


Measurement-Device-Independent Quantum Key Distribution over 200 km
journal, November 2014


Measurement-Device-Independent Quantum Cryptography
journal, May 2015

  • Feihu Xu, ; Curty, Marcos
  • IEEE Journal of Selected Topics in Quantum Electronics, Vol. 21, Issue 3
  • DOI: 10.1109/JSTQE.2014.2381460

Detector-device-independent quantum key distribution
journal, December 2014

  • Lim, Charles Ci Wen; Korzh, Boris; Martin, Anthony
  • Applied Physics Letters, Vol. 105, Issue 22
  • DOI: 10.1063/1.4903350

Quantum cryptographic network based on quantum memories
journal, October 1996


Security of Practical Time-Reversed EPR Quantum Key Distribution
journal, November 2002


Single-photon two-qubit entangled states: Preparation and measurement
journal, April 2003


Trojan-horse attacks on quantum-key-distribution systems
journal, February 2006


Trojan-horse attacks threaten the security of practical quantum cryptography
journal, December 2014


Risk Analysis of Trojan-Horse Attacks on Practical Quantum Key Distribution Systems
journal, May 2015

  • Jain, Nitin; Stiller, Birgit; Khan, Imran
  • IEEE Journal of Selected Topics in Quantum Electronics, Vol. 21, Issue 3
  • DOI: 10.1109/JSTQE.2014.2365585

Memory Attacks on Device-Independent Quantum Cryptography
journal, January 2013


Safeguarding Quantum Key Distribution Through Detection Randomization
journal, May 2015

  • Ferreira da Silva, Thiago; do Amaral, Gustavo C.; Xavier, Guilherme B.
  • IEEE Journal of Selected Topics in Quantum Electronics, Vol. 21, Issue 3
  • DOI: 10.1109/JSTQE.2014.2361793

Works referencing / citing this record:

Practical challenges in quantum key distribution
journal, November 2016

  • Diamanti, Eleni; Lo, Hoi-Kwong; Qi, Bing
  • npj Quantum Information, Vol. 2, Issue 1
  • DOI: 10.1038/npjqi.2016.25

Efficient High-Dimensional Quantum Key Distribution with Hybrid Encoding
journal, January 2019

  • Jo, Yonggi; Park, Hee; Lee, Seung-Woo
  • Entropy, Vol. 21, Issue 1
  • DOI: 10.3390/e21010080