Abstract
Quantum random number generators (QRNGs) based on a symmetric beam splitter have attracted a great deal of interest, and the commercial version can be found in the marketplace. However, practical implementations of this QRNG may be imperfect. Here, we propose two attacks for this kind of QRNG, based on some imperfections existing in devices. The first attack exploits the imperfection that the transmission-reflection ratio of a symmetric beam splitter varies with different wavelengths. The second attack can be successful because of the detection efficiency mismatch in two single-photon detectors. With our attacks, Eve can easily break the inherent randomness of the QRNG without being detected. A key point of our paper is to raise awareness of such security loopholes in existing QRNG schemes.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.