Effect of source tampering in the security of quantum cryptography

Shi-Hai Sun, Feihu Xu, Mu-Sheng Jiang, Xiang-Chun Ma, Hoi-Kwong Lo, and Lin-Mei Liang
Phys. Rev. A 92, 022304 – Published 4 August 2015

Abstract

The security of source has become an increasingly important issue in quantum cryptography. Based on the framework of measurement-device-independent quantum key distribution (MDI-QKD), the source becomes the only region exploitable by a potential eavesdropper (Eve). Phase randomization is a cornerstone assumption in most discrete-variable (DV) quantum communication protocols (e.g., QKD, quantum coin tossing, weak-coherent-state blind quantum computing, and so on), and the violation of such an assumption is thus fatal to the security of those protocols. In this paper, we show a simple quantum hacking strategy, with commercial and homemade pulsed lasers, by Eve that allows her to actively tamper with the source and violate such an assumption, without leaving a trace afterwards. Furthermore, our attack may also be valid for continuous-variable (CV) QKD, which is another main class of QKD protocol, since, excepting the phase random assumption, other parameters (e.g., intensity) could also be changed, which directly determine the security of CV-QKD.

  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Received 24 January 2015

DOI:https://doi.org/10.1103/PhysRevA.92.022304

©2015 American Physical Society

Authors & Affiliations

Shi-Hai Sun1,*, Feihu Xu2,3,†, Mu-Sheng Jiang1, Xiang-Chun Ma1, Hoi-Kwong Lo2,‡, and Lin-Mei Liang1,4,§

  • 1College of Science, National University of Defense Technology, Changsha 410073, China
  • 2Center for Quantum Information and Quantum Control, Department of Electrical and Computer Engineering and Department of Physics, University of Toronto, Toronto, Ontario, M5S 3G4, Canada
  • 3Research Laboratory of Electronics, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge, Massachusetts 02139, USA
  • 4State Key Laboratory of High Performance Computing, National University of Defense Technology, Changsha 410073, China

  • *shsun@nudt.edu.cn
  • tigerfeihuxu@gmail.com
  • hklo@ece.utoronto.ca
  • §nmliang@nudt.edu.cn

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 92, Iss. 2 — August 2015

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review A

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×