Modulation leakage vulnerability in continuous-variable quantum key
distribution
- URL: http://arxiv.org/abs/2103.14567v1
- Date: Fri, 26 Mar 2021 16:28:08 GMT
- Title: Modulation leakage vulnerability in continuous-variable quantum key
distribution
- Authors: Nitin Jain, Ivan Derkach, Hou-Man Chin, Radim Filip, Ulrik L.
Andersen, Vladyslav C. Usenko, and Tobias Gehring
- Abstract summary: We report a modulation leakage vulnerability in a quantum key distribution system.
The leakage arises from the limited suppression of a quantum-information-carrying sideband during modulation.
Our results indicate that the leakage reduces the range over which a positive secret key can be obtained, and can even lead to a security breach.
- Score: 0.5863360388454261
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Flaws in the process of modulation, or encoding of key bits in the
quadratures of the electromagnetic light field, can make continuous-variable
quantum key distribution systems susceptible to leakage of secret information.
Here, we report such a modulation leakage vulnerability in a system that uses
an optical in-phase and quadrature modulator to implement a single sideband
encoding scheme. The leakage arises from the limited suppression of a
quantum-information-carrying sideband during modulation. Based on the results
from a proof-of-concept experiment, we theoretically analyse the impact of this
vulnerability. Our results indicate that the leakage reduces the range over
which a positive secret key can be obtained, and can even lead to a security
breach if not properly taken into account. We also study the effectiveness of
additional trusted noise as a countermeasure to this vulnerability.
Related papers
- Quantum hacking: Induced-photorefraction attack on a practical continuous-variable quantum key distribution system [12.232821041222591]
We explore a new security loophole in a practical continuous-variable quantum key distribution (CVQKD) system, which is opened by the photorefractive effect of lithium niobate-based (LN-based) modulators.
We propose a quantum hacking strategy, i.e., the induced-photorefraction attack, which utilizes the induced photorefraction on the LN-based modulators to hide the classical intercept-resend attack.
arXiv Detail & Related papers (2024-09-12T13:00:09Z) - Security Loophole Induced by Photorefractive Effect in Continous-variable Quantum Key Distribution System [4.7922744779403015]
We analyzed the security loophole of CVQKD under the photorefractive effect (PE)
It is found that the refractive index change of modulators because of PE may lead to an overestimate or underestimate of the final secret key rate.
arXiv Detail & Related papers (2024-08-31T16:25:54Z) - Trusted source noise model of discrete-modulated continuous-variable quantum key distribution [8.019408649120262]
discrete-modulated continuous-variable quantum key distribution.
Traditional approach is to assume that eavesdroppers can control all of the source noise.
We tailor a trusted model specifically for the discrete-modulated protocol and upgrade the security analysis accordingly.
arXiv Detail & Related papers (2024-07-29T10:35:33Z) - Eavesdropper localization for quantum and classical channels via
nonlinear scattering [58.720142291102135]
Quantum key distribution (QKD) offers theoretical security based on the laws of physics.
We present a novel approach to eavesdropper location that can be employed in quantum as well as classical channels.
We demonstrate that our approach outperforms conventional OTDR in the task of localizing an evanescent outcoupling of 1% with cm precision inside standard optical fibers.
arXiv Detail & Related papers (2023-06-25T21:06:27Z) - Proof-of-Principle Demonstration of Fully-Passive Quantum Key
Distribution [2.4149105714758545]
Quantum key distribution (QKD) offers information-theoretic security based on the fundamental laws of physics.
Device imperfections, such as those in active modulators, may introduce side-channel leakage.
Our work demonstrates the feasibility of active-modulation-free QKD in polarization-encoded systems.
arXiv Detail & Related papers (2023-04-20T15:11:41Z) - Robust Control for Dynamical Systems With Non-Gaussian Noise via Formal
Abstractions [59.605246463200736]
We present a novel controller synthesis method that does not rely on any explicit representation of the noise distributions.
First, we abstract the continuous control system into a finite-state model that captures noise by probabilistic transitions between discrete states.
We use state-of-the-art verification techniques to provide guarantees on the interval Markov decision process and compute a controller for which these guarantees carry over to the original control system.
arXiv Detail & Related papers (2023-01-04T10:40:30Z) - Certified Robustness of Quantum Classifiers against Adversarial Examples
through Quantum Noise [68.1992787416233]
We show that adding quantum random rotation noise can improve robustness in quantum classifiers against adversarial attacks.
We derive a certified robustness bound to enable quantum classifiers to defend against adversarial examples.
arXiv Detail & Related papers (2022-11-02T05:17:04Z) - Suppressing Amplitude Damping in Trapped Ions: Discrete Weak
Measurements for a Non-unitary Probabilistic Noise Filter [62.997667081978825]
We introduce a low-overhead protocol to reverse this degradation.
We present two trapped-ion schemes for the implementation of a non-unitary probabilistic filter against amplitude damping noise.
This filter can be understood as a protocol for single-copy quasi-distillation.
arXiv Detail & Related papers (2022-09-06T18:18:41Z) - Modulation leakage-free continuous-variable quantum key distribution [1.8268488712787332]
Continuous-variable (CV) QKD based on coherent states is an attractive scheme for secure communication.
This work is a step towards protecting CVQKD systems against practical imperfections of physical devices and operational limitations without performance degradation.
arXiv Detail & Related papers (2022-05-15T10:07:19Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z) - Quantum noise protects quantum classifiers against adversaries [120.08771960032033]
Noise in quantum information processing is often viewed as a disruptive and difficult-to-avoid feature, especially in near-term quantum technologies.
We show that by taking advantage of depolarisation noise in quantum circuits for classification, a robustness bound against adversaries can be derived.
This is the first quantum protocol that can be used against the most general adversaries.
arXiv Detail & Related papers (2020-03-20T17:56:14Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.