Feasible attack on detector-device-independent quantum key distribution

Abstract Recently, to bridge the gap between security of Measurement-device-independent quantum key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector-device-independent QKD (DDI-QKD), has been independently proposed by several groups and has attracted great interes...

Full description

Bibliographic Details
Main Authors: Kejin Wei, Hongwei Liu, Haiqiang Ma, Xiuqing Yang, Yong Zhang, Yongmei Sun, Jinghua Xiao, Yuefeng Ji
Format: Article
Language:English
Published: Nature Publishing Group 2017-03-01
Series:Scientific Reports
Online Access:https://doi.org/10.1038/s41598-017-00531-y
id doaj-78fb786e2cac45718b6dcea013a730ed
record_format Article
spelling doaj-78fb786e2cac45718b6dcea013a730ed2020-12-08T01:22:21ZengNature Publishing GroupScientific Reports2045-23222017-03-01711810.1038/s41598-017-00531-yFeasible attack on detector-device-independent quantum key distributionKejin Wei0Hongwei Liu1Haiqiang Ma2Xiuqing Yang3Yong Zhang4Yongmei Sun5Jinghua Xiao6Yuefeng Ji7School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and TelecommunicationsSchool of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and TelecommunicationsSchool of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and TelecommunicationsSchool of Science, Beijing Jiaotong UniversitySchool of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and TelecommunicationsSchool of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and TelecommunicationsSchool of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and TelecommunicationsSchool of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and TelecommunicationsAbstract Recently, to bridge the gap between security of Measurement-device-independent quantum key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector-device-independent QKD (DDI-QKD), has been independently proposed by several groups and has attracted great interest. A higher key rate is obtained, since a single photon bell state measurement (BSM) setup is applied to DDI-QKD. Subsequently, Qi has proposed two attacks for this protocol. However, the first attack, in which Bob’s BSM setup is assumed to be completely a “black box”, is easily prevented by using some additional monitoring devices or by specifically characterizing the BSM. The second attack, which combines the blinding attack and the detector wavelength-dependent efficiency, is not explicitly discussed, and its feasibility is not experimentally confirmed. Here, we show that the second attack is not technically viable because of an intrinsically wavelength-dependent property of a realistic beam splitter, which is an essential component in DDI-QKD. Moreover, we propose a feasible attack that combines a well-known attack—detector blinding attack with intrinsic imperfections of single-photon detectors. The experimental measurement and proof-of-principle test results confirm that our attack can allow Eve to get a copy of quantum keys without being detected and that it is feasible with current technology.https://doi.org/10.1038/s41598-017-00531-y
collection DOAJ
language English
format Article
sources DOAJ
author Kejin Wei
Hongwei Liu
Haiqiang Ma
Xiuqing Yang
Yong Zhang
Yongmei Sun
Jinghua Xiao
Yuefeng Ji
spellingShingle Kejin Wei
Hongwei Liu
Haiqiang Ma
Xiuqing Yang
Yong Zhang
Yongmei Sun
Jinghua Xiao
Yuefeng Ji
Feasible attack on detector-device-independent quantum key distribution
Scientific Reports
author_facet Kejin Wei
Hongwei Liu
Haiqiang Ma
Xiuqing Yang
Yong Zhang
Yongmei Sun
Jinghua Xiao
Yuefeng Ji
author_sort Kejin Wei
title Feasible attack on detector-device-independent quantum key distribution
title_short Feasible attack on detector-device-independent quantum key distribution
title_full Feasible attack on detector-device-independent quantum key distribution
title_fullStr Feasible attack on detector-device-independent quantum key distribution
title_full_unstemmed Feasible attack on detector-device-independent quantum key distribution
title_sort feasible attack on detector-device-independent quantum key distribution
publisher Nature Publishing Group
series Scientific Reports
issn 2045-2322
publishDate 2017-03-01
description Abstract Recently, to bridge the gap between security of Measurement-device-independent quantum key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector-device-independent QKD (DDI-QKD), has been independently proposed by several groups and has attracted great interest. A higher key rate is obtained, since a single photon bell state measurement (BSM) setup is applied to DDI-QKD. Subsequently, Qi has proposed two attacks for this protocol. However, the first attack, in which Bob’s BSM setup is assumed to be completely a “black box”, is easily prevented by using some additional monitoring devices or by specifically characterizing the BSM. The second attack, which combines the blinding attack and the detector wavelength-dependent efficiency, is not explicitly discussed, and its feasibility is not experimentally confirmed. Here, we show that the second attack is not technically viable because of an intrinsically wavelength-dependent property of a realistic beam splitter, which is an essential component in DDI-QKD. Moreover, we propose a feasible attack that combines a well-known attack—detector blinding attack with intrinsic imperfections of single-photon detectors. The experimental measurement and proof-of-principle test results confirm that our attack can allow Eve to get a copy of quantum keys without being detected and that it is feasible with current technology.
url https://doi.org/10.1038/s41598-017-00531-y
work_keys_str_mv AT kejinwei feasibleattackondetectordeviceindependentquantumkeydistribution
AT hongweiliu feasibleattackondetectordeviceindependentquantumkeydistribution
AT haiqiangma feasibleattackondetectordeviceindependentquantumkeydistribution
AT xiuqingyang feasibleattackondetectordeviceindependentquantumkeydistribution
AT yongzhang feasibleattackondetectordeviceindependentquantumkeydistribution
AT yongmeisun feasibleattackondetectordeviceindependentquantumkeydistribution
AT jinghuaxiao feasibleattackondetectordeviceindependentquantumkeydistribution
AT yuefengji feasibleattackondetectordeviceindependentquantumkeydistribution
_version_ 1724394984339144704