• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

连续变量量子密钥分发参考脉冲的实用安全性分析

Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution.

作者信息

Zhao Wei, Shi Ronghua, Huang Duan

机构信息

School of Computer Science and Engineering, Central South University, Changsha, 410083, China.

出版信息

Sci Rep. 2019 Dec 3;9(1):18155. doi: 10.1038/s41598-019-54249-0.

DOI:10.1038/s41598-019-54249-0
PMID:31796759
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC6890703/
Abstract

By manipulating the reference pulses amplitude, a security vulnerability is caused by self-reference continuous-variable quantum key distribution. In this paper, we formalize an attack strategy for reference pulses, showing that the proposed attack can compromise the practical security of CVQKD protocol. In this scheme, before the beam splitter attack, Eve intercepts the reference pulses emitted by Alice, using Bayesian algorithm to estimate phase shifts. Subsequently, other reference pulses are re-prepared and resubmitted to Bob. In simulations, Bayesian algorithm effectively estimates the phase drifts and has the high robustness to noise. Therefore, the eavesdropper can bias the excess noise due to the intercept-resend attack and the beam splitter attack. And Alice and Bob believe that their excess noise is below the null key threshold and can still share a secret key. Consequently, the proposed attack shows that its practical security can be compromised by transmitting the reference pulses in the continuous-variable quantum key distribution protocol.

摘要

通过操纵参考脉冲的幅度,自参考连续变量量子密钥分发会导致安全漏洞。在本文中,我们形式化了一种针对参考脉冲的攻击策略,表明所提出的攻击能够危及连续变量量子密钥分发(CVQKD)协议的实际安全性。在该方案中,在分束器攻击之前,伊芙(Eve)拦截爱丽丝(Alice)发射的参考脉冲,使用贝叶斯算法估计相移。随后,重新制备其他参考脉冲并重新发送给鲍勃(Bob)。在模拟中,贝叶斯算法有效地估计了相位漂移,并且对噪声具有高鲁棒性。因此,窃听者可以通过拦截重发攻击和分束器攻击使过量噪声产生偏差。而且爱丽丝和鲍勃认为他们的过量噪声低于零密钥阈值并且仍然可以共享一个秘密密钥。因此,所提出的攻击表明,在连续变量量子密钥分发协议中传输参考脉冲会危及其实用安全性。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/20673d334c89/41598_2019_54249_Figb_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/53f297efefe9/41598_2019_54249_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/9e469f33e961/41598_2019_54249_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/26e3d4a20879/41598_2019_54249_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/f4add601a117/41598_2019_54249_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/d1bf0693d0bc/41598_2019_54249_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/6587d60123ac/41598_2019_54249_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/25e7d06d7b25/41598_2019_54249_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/4570434255cc/41598_2019_54249_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/20673d334c89/41598_2019_54249_Figb_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/53f297efefe9/41598_2019_54249_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/9e469f33e961/41598_2019_54249_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/26e3d4a20879/41598_2019_54249_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/f4add601a117/41598_2019_54249_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/d1bf0693d0bc/41598_2019_54249_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/6587d60123ac/41598_2019_54249_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/25e7d06d7b25/41598_2019_54249_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/4570434255cc/41598_2019_54249_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e788/6890703/20673d334c89/41598_2019_54249_Figb_HTML.jpg

相似文献

1
Practical Security Analysis of Reference Pulses for Continuous-Variable Quantum Key Distribution.连续变量量子密钥分发参考脉冲的实用安全性分析
Sci Rep. 2019 Dec 3;9(1):18155. doi: 10.1038/s41598-019-54249-0.
2
Polarization Attack on Continuous-Variable Quantum Key Distribution with a Local Local Oscillator.基于本地本振的连续变量量子密钥分发中的偏振攻击
Entropy (Basel). 2022 Jul 18;24(7):992. doi: 10.3390/e24070992.
3
Practical security of the continuous-variable quantum key distribution with real local oscillators under phase attack.相位攻击下具有真实本地振荡器的连续变量量子密钥分发的实际安全性
Opt Express. 2019 Jul 22;27(15):20621-20631. doi: 10.1364/OE.27.020621.
4
Monitoring of continuous-variable quantum key distribution system in real environment.真实环境下连续变量量子密钥分发系统的监测
Opt Express. 2017 Aug 7;25(16):19429-19443. doi: 10.1364/OE.25.019429.
5
Quantum Hacking on an Integrated Continuous-Variable Quantum Key Distribution System via Power Analysis.通过功耗分析对集成连续变量量子密钥分发系统进行量子黑客攻击。
Entropy (Basel). 2021 Jan 30;23(2):176. doi: 10.3390/e23020176.
6
Security analysis of practical continuous-variable quantum key distribution systems under laser seeding attack.激光注入攻击下实用连续变量量子密钥分发系统的安全性分析
Opt Express. 2019 Sep 16;27(19):27369-27384. doi: 10.1364/OE.27.027369.
7
Underwater Wavelength Attack on Discrete Modulated Continuous-Variable Quantum Key Distribution.水下波长对离散调制连续变量量子密钥分发的攻击
Entropy (Basel). 2024 Jun 14;26(6):515. doi: 10.3390/e26060515.
8
Phase noise estimation using Bayesian inference for continuous-variable quantum key distribution.基于贝叶斯推理的连续变量量子密钥分发相位噪声估计
Opt Express. 2019 Feb 4;27(3):1838-1853. doi: 10.1364/OE.27.001838.
9
Practical limitation for continuous-variable quantum cryptography using coherent States.使用相干态的连续变量量子密码学的实际限制。
Phys Rev Lett. 2004 Mar 19;92(11):117901. doi: 10.1103/PhysRevLett.92.117901. Epub 2004 Mar 16.
10
Dual-phase-modulated plug-and-play measurement-device-independent continuous-variable quantum key distribution.双相调制即插即用测量设备无关的连续变量量子密钥分发
Opt Express. 2018 Aug 6;26(16):19907-19920. doi: 10.1364/OE.26.019907.

引用本文的文献

1
Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3.量子密钥分发:使用Python3通过BB84协议进行建模与仿真。
Sensors (Basel). 2022 Aug 21;22(16):6284. doi: 10.3390/s22166284.

本文引用的文献

1
Practical security of the continuous-variable quantum key distribution with real local oscillators under phase attack.相位攻击下具有真实本地振荡器的连续变量量子密钥分发的实际安全性
Opt Express. 2019 Jul 22;27(15):20621-20631. doi: 10.1364/OE.27.020621.
2
Parameter Estimation with Almost No Public Communication for Continuous-Variable Quantum Key Distribution.参数估计几乎没有公开的连续变量量子密钥分发的沟通。
Phys Rev Lett. 2018 Jun 1;120(22):220505. doi: 10.1103/PhysRevLett.120.220505.
3
Overcoming the rate-distance limit of quantum key distribution without quantum repeaters.
在不使用量子中继器的情况下突破量子密钥分发的速率-距离限制。
Nature. 2018 May;557(7705):400-403. doi: 10.1038/s41586-018-0066-6. Epub 2018 May 2.
4
Practical gigahertz quantum key distribution robust against channel disturbance.实用太赫兹量子密钥分发对信道干扰具有鲁棒性。
Opt Lett. 2018 May 1;43(9):2030-2033. doi: 10.1364/OL.43.002030.
5
Improved security bound for the round-robin-differential-phase-shift quantum key distribution.循环差分相移量子密钥分发的安全性界限改进
Nat Commun. 2018 Jan 31;9(1):457. doi: 10.1038/s41467-017-02211-x.
6
Satellite-to-ground quantum key distribution.卫星到地面的量子密钥分发。
Nature. 2017 Sep 7;549(7670):43-47. doi: 10.1038/nature23655. Epub 2017 Aug 9.
7
Fundamental limits of repeaterless quantum communications.无中继量子通信的基本极限。
Nat Commun. 2017 Apr 26;8:15043. doi: 10.1038/ncomms15043.
8
Experimental Bayesian Quantum Phase Estimation on a Silicon Photonic Chip.硅光子芯片上的实验贝叶斯量子相位估计
Phys Rev Lett. 2017 Mar 10;118(10):100503. doi: 10.1103/PhysRevLett.118.100503. Epub 2017 Mar 7.
9
Efficient Bayesian Phase Estimation.高效贝叶斯相位估计
Phys Rev Lett. 2016 Jul 1;117(1):010503. doi: 10.1103/PhysRevLett.117.010503. Epub 2016 Jun 30.
10
Long-distance continuous-variable quantum key distribution by controlling excess noise.通过控制过量噪声实现长距离连续变量量子密钥分发
Sci Rep. 2016 Jan 13;6:19201. doi: 10.1038/srep19201.