| Literature DB >> 29523828 |
Yang-Yang Fei1, Xiang-Dong Meng1, Ming Gao2, Hong Wang1, Zhi Ma1,3.
Abstract
Quantum key distribution (QKD) protocol has been proved to provide unconditionally secure key between two remote legitimate users in theory. Key distribution signals are transmitted in a quantum channel which is established by the calibration process to meet the requirement of high count rate and low error rate. All QKD security proofs implicitly assume that the quantum channel has been established securely. However, the eavesdropper may attack the calibration process to break the security assumption of QKD and provide precondition to steal information about the final key successfully. In this paper, we reveal the security risk of the calibration process of a passive-basis-choice BB84 QKD system by launching a quantum man-in-the-middle attack which intercepts all calibration signals and resends faked ones. Large temporal bit-dependent or basis-dependent detector efficiency mismatch can be induced. Then we propose a basis-dependent detector efficiency mismatch (BEM) based faked states attack on a single photon BB84 QKD to stress the threat of BEM. Moreover, the security of single photon QKD systems with BEM is studied simply and intuitively. Two effective countermeasures are suggested to remove the general security risk of the calibration process.Entities:
Year: 2018 PMID: 29523828 PMCID: PMC5845025 DOI: 10.1038/s41598-018-22700-3
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
Figure 1Simple diagram of our quantum man-in-the-middle attack strategy on the calibration process. T: one cycle.
Figure 2(a) Sketch of efficiency curves of four detectors in time frame without being attacked after the calibration process. (b) Sketch of BEM, which is the goal of our proof-of-principle experiment. (c) The faked detector efficiency curve of one of four detectors in our quantum man-in-the-middle attack, the faked efficiency curve of detector V is given as an example. (d) BEM induced after the attack. The downward triangle marker line is the efficiency of detector H; The square marker line is the efficiency of detector V; The circle marker line is the efficiency of detector+; And the upward triangle line is the efficiency of detector −.
BEM-based FSA.
| →Eve | Eve→ | Bob’s result | Detection probability | |
|---|---|---|---|---|
| 0 | ||||
|
| ||||
|
| ||||
|
| ||||
|
| ||||
| 0 | ||||
| Z1 | ||||
|
| ||||
|
| ||||
|
| ||||
|
| ||||
| 0 | ||||
|
| ||||
|
| ||||
|
| ||||
|
| ||||
| 0 | ||||
|
| ||||
|
| ||||
|
| ||||
|
|
Eve measures randomly in X or Z basis before mounting FSA. The first column contains Alice’s basis choice and bit value. The second column shows Eve’s measurement result. The third column shows the parameters of the faked state resent by Eve: basis, bit, timing. The fourth column shows Bob’s measurement result; The corresponding detection probabilities are shown in the last column.
Figure 3The boundary of successful partial FSA.
Figure 4The square (circle, diamond, solid point) markers show the final key rate changes with the fraction of photons attacked by Eve when η = 0.3 (0.5, 0.7, 0.9).
Figure 5The equivalent detection model at t0 of single photon QKD systems. BS: beam splitter; Z: Z-basis measurement; X: X-basis measurement.
Figure 6The black solid (blue dash, green dash dotted, red dotted) line shows the secure key rate R changes with the e when η = 1.0 (0.7, 0.5, 0.2).
Figure 7Schematic diagram of our proof-of-principle experiment. FPGA: field programmable gate array; BS: beam splitter; PBS: polarization beam splitter; SYN: synchronization; P: polarizer; APD: avalanche photon detector; T: detection cycle.