Comment on “Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography” [Appl. Phys. Lett. 98, 231104 (2011)]

作者: Lars Lydersen , Johannes Skaar , Vadim Makarov

DOI: 10.1063/1.3658806

关键词:

摘要: The peculiar properties of quantum mechanics enable possibilities not allowed by classical physics. In particular, two parties can generate a random, secret key at distance, even though an eavesdropper do anything permitted the laws Measuring signals generating key, would ultimately change them, and thus reveal eavesdropper’s presence. This exchange is known as cryptography. Quantum cryptography be, has been proven unconditionally secure using perfect devices. However, when implemented, one must use components available with current technology. These are usually imperfect. Although security for certain imperfections, question remains: be implemented in provable, way, technology? thesis contains both theoretical, experimental contribution to answer this question. On side, used in, complete systems have carefully examined loopholes. it turned out that commercial contained loopholes, which allow capture full without exposing her Furthermore, detector control attack could applicable against variety implementations protocols. theoretical consists proofs very general setting. Precisely, arbitrary individual imperfections source detectors. should make possible wide array imperfect devices Finally, detection scheme proposed, immune compatible those proofs. Therefore, if correctly, offers provable security.

参考文章(17)
ZL Yuan, James F Dynes, Andrew J Shields, Avoiding the blinding attack in QKD Nature Photonics. ,vol. 4, pp. 801- 801 ,(2010) , 10.1038/NPHOTON.2010.278
Daniel Gottesman, Norbert Lütkenhaus, John Preskill, Hoi-Kwong Lo, Security of quantum key distribution with imperfect devices Quantum Information & Computation. ,vol. 4, pp. 325- 360 ,(2004) , 10.26421/QIC4.5-1
Hoi-Kwong Lo, Bing Qi, Chi-Hang Fred Fung, Xiongfeng Ma, Time-shift attack in practical quantum cryptosystems Quantum Information & Computation. ,vol. 7, pp. 73- 82 ,(2007) , 10.5555/2011706.2011709
Hoi-Kw g Lo, Bing Qi, Chi-hang Fred Fung, Xi gfeng Ma, Kiyoshi Tamaki, Security proof of quantum key distribution with detection efficiency mismatch Quantum Information & Computation. ,vol. 9, pp. 131- 165 ,(2009) , 10.5555/2021256.2021264
Gilles Brassard, Norbert Lütkenhaus, Tal Mor, Barry C. Sanders, Limitations on Practical Quantum Cryptography Physical Review Letters. ,vol. 85, pp. 1330- 1333 ,(2000) , 10.1103/PHYSREVLETT.85.1330
Z. L. Yuan, J. F. Dynes, A. J. Shields, Avoiding the blinding attack in QKD Nature Photonics. ,vol. 4, pp. 800- 801 ,(2010) , 10.1038/NPHOTON.2010.269
Lars Lydersen, Nitin Jain, Christoffer Wittmann, Øystein Marøy, Johannes Skaar, Christoph Marquardt, Vadim Makarov, Gerd Leuchs, Superlinear threshold detectors in quantum cryptography Physical Review A. ,vol. 84, pp. 032320- ,(2011) , 10.1103/PHYSREVA.84.032320
Yi Zhao, Chi-Hang Fred Fung, Bing Qi, Christine Chen, Hoi-Kwong Lo, Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems Physical Review A. ,vol. 78, pp. 042333- ,(2008) , 10.1103/PHYSREVA.78.042333
Vadim Makarov, Andrey Anisimov, Johannes Skaar, Effects of detector efficiency mismatch on security of quantum cryptosystems Physical Review A. ,vol. 74, pp. 022313- ,(2006) , 10.1103/PHYSREVA.74.022313
Lars Lydersen, Carlos Wiechers, Christoffer Wittmann, Dominique Elser, Johannes Skaar, Vadim Makarov, Hacking commercial quantum cryptography systems by tailored bright illumination Nature Photonics. ,vol. 4, pp. 686- 689 ,(2010) , 10.1038/NPHOTON.2010.214