ترغب بنشر مسار تعليمي؟ اضغط هنا

Countermeasure against quantum hacking using detection statistics

41   0   0.0 ( 0 )
 نشر من قبل Ga\\\"etan Gras
 تاريخ النشر 2020
  مجال البحث فيزياء
والبحث باللغة English




اسأل ChatGPT حول البحث

Detector blinding attacks have been proposed in the last few years, and they could potentially threaten the security of QKD systems. Even though no complete QKD system has been hacked yet, it is nevertheless important to consider countermeasures to avoid information leakage. In this paper, we present a new countermeasure against these kind of attacks based on the use of multi-pixel detectors. We show that with this method, we are able to estimate an upper bound on the information an eavesdropper could have on the key exchanged. Finally, we test a multi-pixel detector based on SNSPDs to show it can fulfill all the requirement for our countermeasure to be effective.



قيم البحث

اقرأ أيضاً

In real-life implementations of quantum key distribution (QKD), the physical systems with unwanted imperfections would be exploited by an eavesdropper. Based on imperfections in the detectors, detector control attacks have been successfully launched on several QKD systems, and attracted widespread concerns. Here, we propose a robust countermeasure against these attacks just by introducing a variable attenuator in front of the detector. This countermeasure is not only effective against the attacks with blinding light, but also robust against the attacks without blinding light which are more concealed and threatening. Different from previous technical improvements, the single photon detector in our countermeasure model is treated as a blackbox, and the eavesdropper can be detected by statistics of the detection and error rates of the QKD system. Besides theoretical proof, the countermeasure is also supported by an experimental demonstration. Our countermeasure is general in sense that it is independent of the technical details of the detector, and can be easily applied to the existing QKD systems.
Quantum key distribution (QKD) can generate secure key bits between remote users with quantum mechanics. However, the gap between the theoretical model and practical realizations gives eavesdroppers opportunities to intercept secret key. The most ins idious attacks, known as quantum hacking, are the ones with no significant discrepancy of the measurement results using side-channel loopholes of QKD systems. Depicting full-time-scale characteristics of the quantum signals, the quantum channel, and the QKD system can provide legitimate users extra capabilities to defeat malicious attacks. For the first time, we propose the method exploring temporal ghost imaging (TGI) scheme to perceive quantum hacking with temporal fingerprints and experimentally verify its validity. The scheme presents a common approach to promote QKDs practical security from a new perspective of signals and systems.
We analyze the role of entanglement among probes and with external ancillas in quantum metrology. In the absence of noise, it is known that unentangled sequential strategies can achieve the same Heisenberg scaling of entangled strategies and that ext ernal ancillas are useless. This changes in the presence of noise: here we prove that entangled strategies can have higher precision than unentangled ones and that the addition of passive external ancillas can also increase the precision. We analyze some specific noise models and use the results to conjecture a general hierarchy for quantum metrology strategies in the presence of noise.
The peculiar properties of quantum mechanics allow two remote parties to communicate a private, secret key, which is protected from eavesdropping by the laws of physics. So-called quantum key distribution (QKD) implementations always rely on detector s to measure the relevant quantum property of single photons. Here we demonstrate experimentally that the detectors in two commercially available QKD systems can be fully remote-controlled using specially tailored bright illumination. This makes it possible to tracelessly acquire the full secret key; we propose an eavesdropping apparatus built of off-the-shelf components. The loophole is likely to be present in most QKD systems using avalanche photodiodes to detect single photons. We believe that our findings are crucial for strengthening the security of practical QKD, by identifying and patching technological deficiencies.
We show that the full statistics of the two detectors outputs in a balanced homodyne detection setup involving a local oscillator in an ideal coherent state is experimentally accessible despite the excess noise existing in actual laser sources. This possibility is illustrated using phase randomized coherent states signals from which the statistics of Fock states can accurately be obtained. The experimental verification of the recently predicted [K{u}hn and Vogel, Phys. Rev. A, textbf{98}, 013832 (2018)] two-detector correlation probability for Fock states is presented for states $vert 1 rangle$ and $vert 2 rangle$.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا