Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution.

Sci Rep

School of Computer Science and Engineering, Central South University, Changsha, 410083, China.

Published: December 2019

By manipulating the reference pulses amplitude, a security vulnerability is caused by self-reference continuous-variable quantum key distribution. In this paper, we formalize an attack strategy for reference pulses, showing that the proposed attack can compromise the practical security of CVQKD protocol. In this scheme, before the beam splitter attack, Eve intercepts the reference pulses emitted by Alice, using Bayesian algorithm to estimate phase shifts. Subsequently, other reference pulses are re-prepared and resubmitted to Bob. In simulations, Bayesian algorithm effectively estimates the phase drifts and has the high robustness to noise. Therefore, the eavesdropper can bias the excess noise due to the intercept-resend attack and the beam splitter attack. And Alice and Bob believe that their excess noise is below the null key threshold and can still share a secret key. Consequently, the proposed attack shows that its practical security can be compromised by transmitting the reference pulses in the continuous-variable quantum key distribution protocol.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC6890703PMC
http://dx.doi.org/10.1038/s41598-019-54249-0DOI Listing

Publication Analysis

Top Keywords

reference pulses
24
practical security
12
continuous-variable quantum
12
quantum key
12
key distribution
12
pulses continuous-variable
8
proposed attack
8
beam splitter
8
splitter attack
8
bayesian algorithm
8

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!