scholarly journals Retraction Note: Hacking on decoy-state quantum key distribution system with partial phase randomization

2018 ◽  
Vol 8 (1) ◽  
Author(s):  
Shi-Hai Sun ◽  
Mu-Sheng Jiang ◽  
Xiang-Chun Ma ◽  
Chun-Yan Li ◽  
Lin-Mei Liang
2014 ◽  
Vol 4 (1) ◽  
Author(s):  
Shi-Hai Sun ◽  
Mu-Sheng Jiang ◽  
Xiang-Chun Ma ◽  
Chun-Yan Li ◽  
Lin-Mei Liang

Abstract Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.


2009 ◽  
Vol 58 (4) ◽  
pp. 2189
Author(s):  
Jiao Rong-Zhen ◽  
Zhang Wen-Han

2010 ◽  
Vol 10 (2) ◽  
pp. 81-86
Author(s):  
Sellami Ali

Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD system without decoy state in terms of key generation rate and distance. We demonstrate an unconditionally secure key rate of 6.2931 x 10-4per pulse for a 25 km fiber length.


2019 ◽  
Vol 17 (01) ◽  
pp. 1950005
Author(s):  
Peng Zhang ◽  
Rong-Zhen Jiao

The performance of measurement-device-independent quantum key distribution (MDI-QKD) with different numbers of decoy-state are compared. The statistical fluctuation due to the finite length of data is considered based on the standard statistical analysis. The simulation results show that two-decoy-state method is a nearly optimal estimation in the asymptotic case. In the condition of considering statistical fluctuations, the finite length of raw key will slightly decrease the secret key rate. In all simulation cases, the key rate is maximized by optimizing the intensities of the signals. Our numerical simulation may provide valuable theoretical reference for the practical MDI-QKD experiments.


2019 ◽  
Vol 17 (05) ◽  
pp. 1950041
Author(s):  
Chenlin Xing ◽  
Peiyao Zhong ◽  
Rongzhen Jiao

Measurement device-independent quantum key distribution (MDI-QKD) system is significant for exploring the future communication system because of its outstanding performance in security. In this paper, the key rate of single-photon source and WCP source with common wavelength under ideal infinite-decoy case is analyzed in order to outline the relationship between the key rate and the optimization of light intensity. The performance of the key rate under the simplest situation of finite decoy-state (two decoy-state) is compared. The result may provide important parameters for the practical application of QKD system.


2020 ◽  
Vol 52 (3) ◽  
Author(s):  
Fan Liu ◽  
Chun Zhou ◽  
Yang Wang ◽  
Yahui Gan ◽  
Musheng Jiang ◽  
...  

Author(s):  
Ryan D Engle ◽  
Logan O Mailloux ◽  
Michael R Grimaila ◽  
Douglas D Hodson ◽  
Colin V McLaughlin ◽  
...  

Quantum Key Distribution (QKD) is an emerging cybersecurity technology that exploits the laws of quantum mechanics to generate unconditionally secure symmetric cryptographic keying material. The unique nature of QKD shows promise for high-security environments such as those found in banking, government, and the military. However, QKD systems often have implementation non-idealities that can negatively impact their performance and security. This article describes the development of a system-level model designed to study implementation non-idealities in commercially available decoy state enabled QKD systems. Specifically, this paper provides a detailed discussion of the decoy state protocol, its implementation, and its usage to detect sophisticated attacks, such as the photon number splitting attack. In addition, this work suggests an efficient and repeatable systems engineering methodology for understanding and studying communications protocols, architectures, operational configurations, and implementation tradeoffs in complex cyber systems.


Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 508
Author(s):  
Xiaoxu Zhang ◽  
Yang Wang ◽  
Musheng Jiang ◽  
Yifei Lu ◽  
Hongwei Li ◽  
...  

The twin-field quantum key distribution (TF-QKD) protocol and its variations have been proposed to overcome the linear Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound. One variation called phase-matching QKD (PM-QKD) protocol employs discrete phase randomization and the phase post-compensation technique to improve the key rate quadratically. However, the discrete phase randomization opens a loophole to threaten the actual security. In this paper, we first introduce the unambiguous state discrimination (USD) measurement and the photon-number-splitting (PNS) attack against PM-QKD with imperfect phase randomization. Then, we prove the rigorous security of decoy state PM-QKD with discrete phase randomization. Simulation results show that, considering the intrinsic bit error rate and sifting factor, there is an optimal discrete phase randomization value to guarantee security and performance. Furthermore, as the number of discrete phase randomization increases, the key rate of adopting vacuum and one decoy state approaches infinite decoy states, the key rate between discrete phase randomization and continuous phase randomization is almost the same.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Weilong Wang ◽  
Kiyoshi Tamaki ◽  
Marcos Curty

AbstractMeasurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there is no information leakage from the transmitters of the senders, which unfortunately is very difficult to guarantee in practice. In this paper we relax this unrealistic assumption by presenting a general formalism to prove the security of MDI-QKD with leaky sources. With this formalism, we analyze the finite-key security of two prominent MDI-QKD schemes—a symmetric three-intensity decoy-state MDI-QKD protocol and a four-intensity decoy-state MDI-QKD protocol—and determine their robustness against information leakage from both the intensity modulator and the phase modulator of the transmitters. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated. Thus, it provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage.


Sign in / Sign up

Export Citation Format

Share Document