Abstract

In a practical continuous-variable quantum-key-distribution (CVQKD) system, a strong local oscillator (LO) signal in a quantum channel may be manipulated by eavesdropper Eve to steal information about secret keys through general attacks (e.g., entangling cloner attack or intercept-resend attack) without being detected, which is an effective quantum hacking strategy, i.e., LO attacks. To guarantee the practical security of the system, a general monitoring scheme has been previously demonstrated to resist this quantum hacking attack, where the channel transmittance was regarded as a fixed value related to transmission distance. However, practical communication environments are complex, which may result in the time-varying transmittance. This deviation may affect the effectiveness of this monitoring scheme. In this paper, we investigate the monitoring of CVQKD systems running in complex communication environments. We first model the LO attacks on practical CVQKD systems in complex environments, where the channel transmittance is assumed to obey a fixed distribution. Then, the low bound of intensity disturbance of the LO signal for Eve successfully concealing herself is obtained based on this model, where we consider all noise that can be used by Eve in complex communication environments. Simultaneously, we obtain an optimal monitoring condition to resist the LO attacks. Our numerical analysis confirms that the proposed monitoring scheme can effectively resist the LO attacks on practical CVQKD systems in complex environments. Subsequently, the feasibility of this way is again demonstrated by using a quantitative example. It is important that this monitoring scheme can also be extended to resist other quantum hacking attacks.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.