Abstract

The twin-field quantum key distribution (TF-QKD) and its variants can overcome the fundamental rate-distance limit of QKD. However, their physical implementations with the side channels remain the subject of further research. We test the side channel of a type of external intensity modulation that applies a Mach–Zehnder-type electro-optical intensity modulator, which shows the distinguishability of the signal and decoy states in the frequency domain. Based on this security loophole, we propose a side-channel attack, named the passive frequency-shift attack, on the imperfect implementation of the sending or not-sending (SNS) TF-QKD protocol. We analyze the performance of the SNS protocol with the actively odd-parity pairing (AOPP) method under the side-channel attack by giving the formula of the upper bound of the real secret key rate and comparing it with the lower bound of the secret key rate under Alice and Bob’s estimation. The simulation results quantitatively show the effectiveness of the attack on the imperfect devices at a long distance. Our results emphasize the importance of practical security at the light source and might provide a valuable reference for device selection in the practical implementation of the SNS protocol.

Highlights

  • Quantum key distribution (QKD) promises to share the secret key bits with its security guaranteed by the laws of quantum physics [1,2,3]

  • We analyze the adverse impact of the side channels by giving the formula of the upper bound of the secret key rate and comparing it with the lower bound of the secret key rate under Alice and Bob’s estimation

  • Eve cannot distinguish the decoy and signal states without errors, the decoy-state method may not estimate the lower bound of the secret key rate correctly when the transmittances of the signal and decoy states differ

Read more

Summary

Introduction

Quantum key distribution (QKD) promises to share the secret key bits with its security guaranteed by the laws of quantum physics [1,2,3]. These conditions may be not satisfied in the practical systems due to the imperfect devices [40,41,42,43] or Eve’s disturbance [44,45,46,47,48,49,50] In those QKD protocols with the practical light source, the decoy-state method is vital and used to monitor the channel eavesdropping [51] in which the security is based on the fact that Eve cannot distinguish between the signal and decoy states.

Frequency Shift of Intensity Modulators
Passive Frequency-Shift Attack on Imperfect Implementation of SNS
Numerical Simulations
Discussion
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.