Feasible attack on detector-device-independent quantum key distribution
Abstract Recently, to bridge the gap between security of Measurement-device-independent quantum key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector-device-independent QKD (DDI-QKD), has been independently proposed by several groups and has attracted great interes...
Main Authors: | , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Nature Publishing Group
2017-03-01
|
Series: | Scientific Reports |
Online Access: | https://doi.org/10.1038/s41598-017-00531-y |
id |
doaj-78fb786e2cac45718b6dcea013a730ed |
---|---|
record_format |
Article |
spelling |
doaj-78fb786e2cac45718b6dcea013a730ed2020-12-08T01:22:21ZengNature Publishing GroupScientific Reports2045-23222017-03-01711810.1038/s41598-017-00531-yFeasible attack on detector-device-independent quantum key distributionKejin Wei0Hongwei Liu1Haiqiang Ma2Xiuqing Yang3Yong Zhang4Yongmei Sun5Jinghua Xiao6Yuefeng Ji7School of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and TelecommunicationsSchool of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and TelecommunicationsSchool of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and TelecommunicationsSchool of Science, Beijing Jiaotong UniversitySchool of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and TelecommunicationsSchool of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and TelecommunicationsSchool of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and TelecommunicationsSchool of Science and State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and TelecommunicationsAbstract Recently, to bridge the gap between security of Measurement-device-independent quantum key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector-device-independent QKD (DDI-QKD), has been independently proposed by several groups and has attracted great interest. A higher key rate is obtained, since a single photon bell state measurement (BSM) setup is applied to DDI-QKD. Subsequently, Qi has proposed two attacks for this protocol. However, the first attack, in which Bob’s BSM setup is assumed to be completely a “black box”, is easily prevented by using some additional monitoring devices or by specifically characterizing the BSM. The second attack, which combines the blinding attack and the detector wavelength-dependent efficiency, is not explicitly discussed, and its feasibility is not experimentally confirmed. Here, we show that the second attack is not technically viable because of an intrinsically wavelength-dependent property of a realistic beam splitter, which is an essential component in DDI-QKD. Moreover, we propose a feasible attack that combines a well-known attack—detector blinding attack with intrinsic imperfections of single-photon detectors. The experimental measurement and proof-of-principle test results confirm that our attack can allow Eve to get a copy of quantum keys without being detected and that it is feasible with current technology.https://doi.org/10.1038/s41598-017-00531-y |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Kejin Wei Hongwei Liu Haiqiang Ma Xiuqing Yang Yong Zhang Yongmei Sun Jinghua Xiao Yuefeng Ji |
spellingShingle |
Kejin Wei Hongwei Liu Haiqiang Ma Xiuqing Yang Yong Zhang Yongmei Sun Jinghua Xiao Yuefeng Ji Feasible attack on detector-device-independent quantum key distribution Scientific Reports |
author_facet |
Kejin Wei Hongwei Liu Haiqiang Ma Xiuqing Yang Yong Zhang Yongmei Sun Jinghua Xiao Yuefeng Ji |
author_sort |
Kejin Wei |
title |
Feasible attack on detector-device-independent quantum key distribution |
title_short |
Feasible attack on detector-device-independent quantum key distribution |
title_full |
Feasible attack on detector-device-independent quantum key distribution |
title_fullStr |
Feasible attack on detector-device-independent quantum key distribution |
title_full_unstemmed |
Feasible attack on detector-device-independent quantum key distribution |
title_sort |
feasible attack on detector-device-independent quantum key distribution |
publisher |
Nature Publishing Group |
series |
Scientific Reports |
issn |
2045-2322 |
publishDate |
2017-03-01 |
description |
Abstract Recently, to bridge the gap between security of Measurement-device-independent quantum key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector-device-independent QKD (DDI-QKD), has been independently proposed by several groups and has attracted great interest. A higher key rate is obtained, since a single photon bell state measurement (BSM) setup is applied to DDI-QKD. Subsequently, Qi has proposed two attacks for this protocol. However, the first attack, in which Bob’s BSM setup is assumed to be completely a “black box”, is easily prevented by using some additional monitoring devices or by specifically characterizing the BSM. The second attack, which combines the blinding attack and the detector wavelength-dependent efficiency, is not explicitly discussed, and its feasibility is not experimentally confirmed. Here, we show that the second attack is not technically viable because of an intrinsically wavelength-dependent property of a realistic beam splitter, which is an essential component in DDI-QKD. Moreover, we propose a feasible attack that combines a well-known attack—detector blinding attack with intrinsic imperfections of single-photon detectors. The experimental measurement and proof-of-principle test results confirm that our attack can allow Eve to get a copy of quantum keys without being detected and that it is feasible with current technology. |
url |
https://doi.org/10.1038/s41598-017-00531-y |
work_keys_str_mv |
AT kejinwei feasibleattackondetectordeviceindependentquantumkeydistribution AT hongweiliu feasibleattackondetectordeviceindependentquantumkeydistribution AT haiqiangma feasibleattackondetectordeviceindependentquantumkeydistribution AT xiuqingyang feasibleattackondetectordeviceindependentquantumkeydistribution AT yongzhang feasibleattackondetectordeviceindependentquantumkeydistribution AT yongmeisun feasibleattackondetectordeviceindependentquantumkeydistribution AT jinghuaxiao feasibleattackondetectordeviceindependentquantumkeydistribution AT yuefengji feasibleattackondetectordeviceindependentquantumkeydistribution |
_version_ |
1724394984339144704 |