Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols
نویسندگان
چکیده
In quantum cryptosystems, variations in detector efficiency can be exploited to stage a successful attack. This happens when the efficiencies of Bob’s two detectors are different functions of a control parameter accessible to Eve (e.g., timing of the incoming pulses). It has previously been shown that the Bennett-Brassard 1984 (BB84) protocol is vulnerable to this attack. In this paper, we show that several other protocols and encodings may also be vulnerable. We consider a faked states attack in the case of a partial efficiency mismatch on the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol, and derive the quantum bit error rate as a function of detector efficiencies. Additionally, it is shown how faked states can in principle be constructed for quantum cryptosystems that use a phase-time encoding, the differential phase shift keying (DPSK) and the Ekert protocols.
منابع مشابه
Quantum Flows for Secret Key Distribution
In practice, the security of a Quantum Key Distribution (QKD) system relies not only on quantum mechanical principles, but it also significantly relies on the physical implementation of the protocol. Nowadays, technological detector loopholes of QKD systems have been demonstrated, and some successful attacks that exploit vulnerabilities of the Avalanche Photo Diodes (APD’s) have been performed....
متن کاملSecurity of quantum key distribution with bit and basis dependent detector flaws
We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), in the presence of bit and basis dependent detector flaws. We suggest a powerful attack that can be used in systems with detector efficiency mismatch, even if the detector assignments are chosen randomly by Bob. A security proof is provided, valid for any basis dependent, linear optical imp...
متن کاملPerformance of two quantum-key-distribution protocols
We compare the performance of Bennett-Brassard 1984 BB84 and Scarani-Acin-Ribordy-Gisin 2004 SARG04 protocols, the latter of which was proposed by V. Scarani et al. Phys. Rev. Lett. 92, 057901 2004 . Specifically, in this paper, we investigate the SARG04 protocol with two-way classical communications and the SARG04 protocol with decoy states. In the first part of the paper, we show that the SAR...
متن کاملOptimization of Quantum Key Distribution Protocols
November 23, 2017 Quantum Key Distribution is a practically implementable information-theoretic secure method for transmitting keys to remote partners performing quantum communication. After examining various protocols from the simplest such as QC and BB84 we move on to describe BBM92, DPSK, SARG04 and finally MDI from the largest possible communication distance and highest secret key bitrate. ...
متن کاملHeader Extraction and Control for an Asynchronous Optical Packet Switch Based on DPSK Decoding
A novel optical header extraction scheme based on optical differential phase shift keying—DPSK—decoding is examined analytically and experimentally. The header is applied in front of the payload, on the phase of a pulsed optical level introduced for the duration of the header. The proposed scheme offers maximized header extraction efficiency, required by the electronics to identify the header b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Quantum Information & Computation
دوره 8 شماره
صفحات -
تاریخ انتشار 2008