Security of QKD-systems with detector efficiency mismatch

作者: Lars Vincent van De Wiel Lydersen

DOI:

关键词:

摘要: The rules of quantum mechanics makes it possible to exchange a secret key at distance. This is called distribution (QKD). In theory the can be made completely secure. Real QKD implementations however, has numerous imperfections. Luckily one also been able prove security with large variety field matured over recent years, and now reached commercial applications photons as bits, optical fibers channel. Today there are least three vendors QKD-systems. We live in times hacking. Researchers begun task breaking Many new imperfections discovered, some which might used break QKD. thesis study detector efficiency mismatch loophole. Most QKD-systems require two detectors, virtually impossible make identical detectors exact same efficiency. What worse, turns out that eavesdropper often control relative efficiencies trough domain, for instance by controlling timing, frequency or spacial mode photons. turn gain information about key. Previously best known attack would compromise if 1:15. Here current attacks on systems improved 1:4. less than found QKD-system, so could principle eavesdrop this QKD-system. One try close loophole modifying implementation. suggestion four state Bob. problem patch will open other loopholes, these loopholes reopen remove Eves doing sufficient amount extra privacy amplification. general bound presented, quantifying required amplification Eve's proof more previous proof, valid any basis dependent, possibly lossy, linear channel receiver/detectors. Since realistic assumptions QKD-implementation, represents major step closing real devices.

参考文章(58)
Renato Renner, Symmetry of large physical systems implies independence of subsystems Nature Physics. ,vol. 3, pp. 645- 649 ,(2007) , 10.1038/NPHYS684
Daniel Gottesman, Norbert Lütkenhaus, John Preskill, Hoi-Kwong Lo, Security of quantum key distribution with imperfect devices Quantum Information & Computation. ,vol. 4, pp. 325- 360 ,(2004) , 10.26421/QIC4.5-1
Hoi-Kwong Lo, Bing Qi, Chi-Hang Fred Fung, Xiongfeng Ma, Time-shift attack in practical quantum cryptosystems Quantum Information & Computation. ,vol. 7, pp. 73- 82 ,(2007) , 10.5555/2011706.2011709
Hoi-Kw g Lo, Bing Qi, Chi-hang Fred Fung, Xi gfeng Ma, Kiyoshi Tamaki, Security proof of quantum key distribution with detection efficiency mismatch Quantum Information & Computation. ,vol. 9, pp. 131- 165 ,(2009) , 10.5555/2021256.2021264
Isaac L. Chuang, Michael A. Nielsen, Quantum Computation and Quantum Information ,(2000)
Xiang-Bin Wang, Beating the photon-number-splitting attack in practical quantum cryptography. Physical Review Letters. ,vol. 94, pp. 230503- 230503 ,(2005) , 10.1103/PHYSREVLETT.94.230503
N. Gisin, S. Fasel, B. Kraus, H. Zbinden, G. Ribordy, Trojan-horse attacks on quantum-key-distribution systems Physical Review A. ,vol. 73, pp. 022320- ,(2006) , 10.1103/PHYSREVA.73.022320