• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

对探测器无关量子密钥分发的可行攻击。

Feasible attack on detector-device-independent quantum key distribution.

作者信息

Wei Kejin, Liu Hongwei, Ma Haiqiang, Yang Xiuqing, Zhang Yong, Sun Yongmei, Xiao Jinghua, Ji Yuefeng

机构信息

School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and Telecommunications, Beijing, 100876, China.

Guangxi Key Laboratory for Relativistic Astrophysics, School of Physics Science and Technology, Guangxi University, Nanning, 530004, China.

出版信息

Sci Rep. 2017 Mar 27;7(1):449. doi: 10.1038/s41598-017-00531-y.

DOI:10.1038/s41598-017-00531-y
PMID:28348408
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC5428651/
Abstract

Recently, to bridge the gap between security of Measurement-device-independent quantum key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector-device-independent QKD (DDI-QKD), has been independently proposed by several groups and has attracted great interest. A higher key rate is obtained, since a single photon bell state measurement (BSM) setup is applied to DDI-QKD. Subsequently, Qi has proposed two attacks for this protocol. However, the first attack, in which Bob's BSM setup is assumed to be completely a "black box", is easily prevented by using some additional monitoring devices or by specifically characterizing the BSM. The second attack, which combines the blinding attack and the detector wavelength-dependent efficiency, is not explicitly discussed, and its feasibility is not experimentally confirmed. Here, we show that the second attack is not technically viable because of an intrinsically wavelength-dependent property of a realistic beam splitter, which is an essential component in DDI-QKD. Moreover, we propose a feasible attack that combines a well-known attack-detector blinding attack with intrinsic imperfections of single-photon detectors. The experimental measurement and proof-of-principle test results confirm that our attack can allow Eve to get a copy of quantum keys without being detected and that it is feasible with current technology.

摘要

最近,为了弥合测量设备无关量子密钥分发(MDI-QKD)的安全性与高密钥率之间的差距,几个研究小组独立提出了一种新颖的协议,即所谓的探测器设备无关量子密钥分发(DDI-QKD),并引起了极大的关注。由于将单光子贝尔态测量(BSM)装置应用于DDI-QKD,因此获得了更高的密钥率。随后,Qi针对该协议提出了两种攻击方法。然而,第一种攻击方法,即假设鲍勃的BSM装置完全是一个“黑匣子”,通过使用一些额外的监测设备或通过专门表征BSM,很容易被防范。第二种攻击方法,它结合了致盲攻击和探测器波长相关效率,没有得到明确讨论,其可行性也没有经过实验证实。在这里,我们表明,由于现实分束器的固有波长相关特性,第二种攻击在技术上不可行,而分束器是DDI-QKD中的一个关键组件。此外,我们提出了一种可行的攻击方法,它将一种著名的攻击——探测器致盲攻击与单光子探测器的固有缺陷结合起来。实验测量和原理验证测试结果证实,我们的攻击可以让伊芙在不被察觉的情况下获得量子密钥的副本,并且在当前技术下是可行的。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3682/5428651/bd473f30ce16/41598_2017_531_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3682/5428651/47315ceff42f/41598_2017_531_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3682/5428651/050ec6dbcba4/41598_2017_531_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3682/5428651/a72f4898feb0/41598_2017_531_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3682/5428651/b8696c7d7a94/41598_2017_531_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3682/5428651/d0d02b555832/41598_2017_531_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3682/5428651/bd473f30ce16/41598_2017_531_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3682/5428651/47315ceff42f/41598_2017_531_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3682/5428651/050ec6dbcba4/41598_2017_531_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3682/5428651/a72f4898feb0/41598_2017_531_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3682/5428651/b8696c7d7a94/41598_2017_531_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3682/5428651/d0d02b555832/41598_2017_531_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3682/5428651/bd473f30ce16/41598_2017_531_Fig6_HTML.jpg

相似文献

1
Feasible attack on detector-device-independent quantum key distribution.对探测器无关量子密钥分发的可行攻击。
Sci Rep. 2017 Mar 27;7(1):449. doi: 10.1038/s41598-017-00531-y.
2
Loss-tolerant measurement-device-independent quantum private queries.容限容错的测量设备无关量子私有查询。
Sci Rep. 2017 Jan 4;7:39733. doi: 10.1038/srep39733.
3
Detecting a Photon-Number Splitting Attack in Decoy-State Measurement-Device-Independent Quantum Key Distribution via Statistical Hypothesis Testing.通过统计假设检验在诱骗态测量设备无关量子密钥分发中检测光子数分裂攻击
Entropy (Basel). 2022 Sep 2;24(9):1232. doi: 10.3390/e24091232.
4
Insecurity of Detector-Device-Independent Quantum Key Distribution.探测器-设备无关量子密钥分发的安全性问题
Phys Rev Lett. 2016 Dec 16;117(25):250505. doi: 10.1103/PhysRevLett.117.250505.
5
Hacking single-photon avalanche detectors in quantum key distribution via pulse illumination.通过脉冲照明对量子密钥分发中的单光子雪崩探测器进行黑客攻击。
Opt Express. 2020 Aug 17;28(17):25574-25590. doi: 10.1364/OE.397962.
6
Counterfactual quantum key distribution with untrusted detectors.基于不可信探测器的反事实量子密钥分发
Heliyon. 2023 Feb 13;9(2):e13719. doi: 10.1016/j.heliyon.2023.e13719. eCollection 2023 Feb.
7
Measurement-device-independent quantum key distribution with modified coherent state.基于修正相干态的测量设备无关量子密钥分发
Opt Lett. 2014 Feb 15;39(4):880-3. doi: 10.1364/OL.39.000880.
8
Measurement-Device-Independent Twin-Field Quantum Key Distribution.测量设备无关的双场量子密钥分发
Sci Rep. 2019 Feb 28;9(1):3045. doi: 10.1038/s41598-019-39454-1.
9
Enhancing the Security of the BB84 Quantum Key Distribution Protocol against Detector-Blinding Attacks via the Use of an Active Quantum Entropy Source in the Receiving Station.通过在接收站使用有源量子熵源增强BB84量子密钥分发协议抵御探测器致盲攻击的安全性。
Entropy (Basel). 2023 Nov 6;25(11):1518. doi: 10.3390/e25111518.
10
Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks.真实世界双光子干涉和抗探测器攻击原理验证量子密钥分发。
Phys Rev Lett. 2013 Sep 27;111(13):130501. doi: 10.1103/PhysRevLett.111.130501. Epub 2013 Sep 23.

引用本文的文献

1
An Effective Parameter Analysis for Sending-or-Not-Sending Quantum Key Distribution with Untrusted Light Sources.基于不可信光源的量子密钥分发是否发送的有效参数分析
Entropy (Basel). 2025 May 22;27(6):547. doi: 10.3390/e27060547.
2
Advances in Chip-Based Quantum Key Distribution.基于芯片的量子密钥分发进展。
Entropy (Basel). 2022 Sep 22;24(10):1334. doi: 10.3390/e24101334.
3
Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3.量子密钥分发:使用Python3通过BB84协议进行建模与仿真。

本文引用的文献

1
Measurement-device-independent quantum key distribution over 200 km.200 公里量级的测量设备无关量子密钥分发。
Phys Rev Lett. 2014 Nov 7;113(19):190501. doi: 10.1103/PhysRevLett.113.190501. Epub 2014 Nov 6.
2
Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution.实验演示偏振编码测量设备无关量子密钥分发。
Phys Rev Lett. 2014 May 16;112(19):190503. doi: 10.1103/PhysRevLett.112.190503. Epub 2014 May 14.
3
Laser damage helps the eavesdropper in quantum cryptography.激光损伤帮助量子密码学中的窃听者。
Sensors (Basel). 2022 Aug 21;22(16):6284. doi: 10.3390/s22166284.
Phys Rev Lett. 2014 Feb 21;112(7):070503. doi: 10.1103/PhysRevLett.112.070503. Epub 2014 Feb 18.
4
Experimental measurement-device-independent quantum key distribution.实验测量设备无关的量子密钥分发。
Phys Rev Lett. 2013 Sep 27;111(13):130502. doi: 10.1103/PhysRevLett.111.130502. Epub 2013 Sep 23.
5
Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks.真实世界双光子干涉和抗探测器攻击原理验证量子密钥分发。
Phys Rev Lett. 2013 Sep 27;111(13):130501. doi: 10.1103/PhysRevLett.111.130501. Epub 2013 Sep 23.
6
Measurement-device-independent quantum key distribution.测量设备无关的量子密钥分发。
Phys Rev Lett. 2012 Mar 30;108(13):130503. doi: 10.1103/PhysRevLett.108.130503.
7
Side-channel-free quantum key distribution.无侧信道的量子密钥分发。
Phys Rev Lett. 2012 Mar 30;108(13):130502. doi: 10.1103/PhysRevLett.108.130502.
8
Device calibration impacts security of quantum key distribution.设备校准影响量子密钥分发的安全性。
Phys Rev Lett. 2011 Sep 9;107(11):110501. doi: 10.1103/PhysRevLett.107.110501.
9
Full-field implementation of a perfect eavesdropper on a quantum cryptography system.全场实现量子密码系统的完美窃听者。
Nat Commun. 2011 Jun 14;2:349. doi: 10.1038/ncomms1348.
10
Thermal blinding of gated detectors in quantum cryptography.量子密码术中门控探测器的热致盲
Opt Express. 2010 Dec 20;18(26):27938-54. doi: 10.1364/OE.18.027938.