• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于不可信探测器的反事实量子密钥分发

Counterfactual quantum key distribution with untrusted detectors.

作者信息

Lin Ya-Qian, Wang Meng, Yang Xiu-Qing, Liu Hong-Wei

机构信息

College of Science, Inner Mongolia University of Technology, Hohhot 010051, China.

China Information Technology Security Evaluation Center, Beijing 100085, China.

出版信息

Heliyon. 2023 Feb 13;9(2):e13719. doi: 10.1016/j.heliyon.2023.e13719. eCollection 2023 Feb.

DOI:10.1016/j.heliyon.2023.e13719
PMID:36879753
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9984423/
Abstract

Compared with the traditional BB84 protocol, the counterfactual quantum key distribution (QKD) does not rely on any signal travelling in the quantum channel, and therefore can present a security advantage where Eve cannot fully access signal. However, the practical system may be damaged in a scenario where the devices are untrusted. In this paper, we analyze the security of counterfactual QKD in untrusted detectors scenario. We show that the requirement to disclose "which detector clicked" has become the main loophole in all counterfactual QKD versions. An eavesdropping scheme which is similar to the memory attack on device-independent QKD could break its security by exploiting detectors' imperfections. We consider two different counterfactual QKD protocols and analyze their security against this major loophole. One is a modified Noh09 protocol, which would be secure in untrusted detectors context. Another is a variant of counterfactual QKD with high efficiency (Phys. Rev. A 104 (2021) 022424) against a series of detectors side-channel attacks as well as against other attacks that exploit detectors imperfections.

摘要

与传统的BB84协议相比,反事实量子密钥分发(QKD)不依赖于任何在量子信道中传输的信号,因此在伊芙(Eve)无法完全获取信号的情况下具有安全优势。然而,在设备不可信的场景中,实际系统可能会受到损害。在本文中,我们分析了在不可信探测器场景下反事实QKD的安全性。我们表明,披露“哪个探测器被触发”的要求已成为所有反事实QKD版本中的主要漏洞。一种类似于对与设备无关的QKD进行记忆攻击的窃听方案,可以通过利用探测器的缺陷来破坏其安全性。我们考虑了两种不同的反事实QKD协议,并分析了它们针对这一主要漏洞的安全性。一种是改进的Noh09协议,在不可信探测器的情况下它是安全的。另一种是具有高效率的反事实QKD变体(《物理评论A》104 (2021) 022424),可抵御一系列探测器侧信道攻击以及利用探测器缺陷的其他攻击。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dafa/9984423/b0b67a544d06/gr003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dafa/9984423/963af7c1c521/gr001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dafa/9984423/1ff6d165c2f6/gr002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dafa/9984423/b0b67a544d06/gr003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dafa/9984423/963af7c1c521/gr001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dafa/9984423/1ff6d165c2f6/gr002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dafa/9984423/b0b67a544d06/gr003.jpg

相似文献

1
Counterfactual quantum key distribution with untrusted detectors.基于不可信探测器的反事实量子密钥分发
Heliyon. 2023 Feb 13;9(2):e13719. doi: 10.1016/j.heliyon.2023.e13719. eCollection 2023 Feb.
2
Insecurity of Detector-Device-Independent Quantum Key Distribution.探测器-设备无关量子密钥分发的安全性问题
Phys Rev Lett. 2016 Dec 16;117(25):250505. doi: 10.1103/PhysRevLett.117.250505.
3
Open-Destination Measurement-Device-Independent Quantum Key Distribution Network.开放目的地测量设备无关量子密钥分发网络
Entropy (Basel). 2020 Sep 26;22(10):1083. doi: 10.3390/e22101083.
4
On the security of semi-device-independent QKD protocols.关于半设备无关量子密钥分发协议的安全性。
Quantum Inf Process. 2018;17(6):131. doi: 10.1007/s11128-018-1892-z. Epub 2018 Apr 21.
5
Feasible attack on detector-device-independent quantum key distribution.对探测器无关量子密钥分发的可行攻击。
Sci Rep. 2017 Mar 27;7(1):449. doi: 10.1038/s41598-017-00531-y.
6
A Review of Security Evaluation of Practical Quantum Key Distribution System.实用量子密钥分发系统的安全性评估综述
Entropy (Basel). 2022 Feb 10;24(2):260. doi: 10.3390/e24020260.
7
Quantum man-in-the-middle attack on the calibration process of quantum key distribution.量子密钥分发校准过程中的量子中间人攻击。
Sci Rep. 2018 Mar 9;8(1):4283. doi: 10.1038/s41598-018-22700-3.
8
Hacking single-photon avalanche detectors in quantum key distribution via pulse illumination.通过脉冲照明对量子密钥分发中的单光子雪崩探测器进行黑客攻击。
Opt Express. 2020 Aug 17;28(17):25574-25590. doi: 10.1364/OE.397962.
9
Quantum key distribution with prepare-and-measure Bell test.基于制备与测量贝尔测试的量子密钥分发
Sci Rep. 2016 Oct 13;6:35032. doi: 10.1038/srep35032.
10
Plug-and-play round-robin differential phase-shift quantum key distribution.即插即用循环差分相移量子密钥分发
Sci Rep. 2017 Nov 13;7(1):15435. doi: 10.1038/s41598-017-15777-9.

本文引用的文献

1
Counterfactual protocol within device independent framework and its insecurity.设备无关框架内的反事实协议及其不安全性。
Sci Rep. 2020 Apr 3;10(1):5847. doi: 10.1038/s41598-020-62812-3.
2
Direct counterfactual communication via quantum Zeno effect.通过量子芝诺效应进行直接反事实通信。
Proc Natl Acad Sci U S A. 2017 May 9;114(19):4920-4924. doi: 10.1073/pnas.1614560114. Epub 2017 Apr 25.
3
Protocol for direct counterfactual quantum communication.直接反事实量子通信协议。
Phys Rev Lett. 2013 Apr 26;110(17):170502. doi: 10.1103/PhysRevLett.110.170502. Epub 2013 Apr 23.
4
Memory attacks on device-independent quantum cryptography.对设备无关量子密码学的记忆攻击。
Phys Rev Lett. 2013 Jan 4;110(1):010503. doi: 10.1103/PhysRevLett.110.010503. Epub 2013 Jan 2.
5
Experimental demonstration of counterfactual quantum communication.反事实量子通信的实验演示。
Phys Rev Lett. 2012 Jul 20;109(3):030501. doi: 10.1103/PhysRevLett.109.030501. Epub 2012 Jul 19.
6
Counterfactual quantum cryptography.反事实量子密码学。
Phys Rev Lett. 2009 Dec 4;103(23):230501. doi: 10.1103/PhysRevLett.103.230501. Epub 2009 Dec 1.
7
Counterfactual quantum computation through quantum interrogation.通过量子询问实现的反事实量子计算
Nature. 2006 Feb 23;439(7079):949-52. doi: 10.1038/nature04523.
8
Interaction-free measurement.
Phys Rev Lett. 1995 Jun 12;74(24):4763-4766. doi: 10.1103/PhysRevLett.74.4763.