Practical security of local local oscillator continuous-variable quantum key distribution systems with pulse width mismatch
- URL: http://arxiv.org/abs/2509.26021v1
- Date: Tue, 30 Sep 2025 09:50:07 GMT
- Title: Practical security of local local oscillator continuous-variable quantum key distribution systems with pulse width mismatch
- Authors: Yi Zheng, Jiarui Wu, Chenlei Fang, Qingbing Ji, Wei Pan, Haobin Shi,
- Abstract summary: This paper investigates the practical security issues of continuous-variable quantum key distribution (CVQKD) systems when pulse width mismatch occurs between the signal and the signal.<n>We find that under such mismatch, the key parameters involved in secret key rate calculation are incorrectly estimated, leading to an overestimation of the system's secret key rate.<n>This imperfect mismatch can open a loophole for Eve to perform attacks in practical systems.
- Score: 15.179851618304232
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In continuous-variable quantum key distribution (CVQKD) systems, using a local local oscillator (LLO) scheme removes the local oscillator side channel, enhances Bob's detection performance and reduces the excess noise caused by photon leakage, thereby effectively improves the system's security and performance. However, in this scheme, since the signal and the LO are generated by different lasers and the signal propagates through the untrusted quantum channel, their pulse widths may become mismatched. Such mismatches may reduce the precision of detection at Bob, affecting parameter estimation processes and leading to inaccurate calculations of the secret key rate. Moreover, mismatches may introduce potential security loopholes. Thus, this paper investigates the practical security issues of the LLO-CVQKD system when pulse width mismatch occurs between the local oscillator and the signal. We first model the case of pulse width mismatch and analyze its impact on Bob's detection. Then, we simulate the secret key rate under different mismatch levels. Based on the analysis, we find that under such mismatch, the key parameters involved in secret key rate calculation are incorrectly estimated, leading to an overestimation of the system's secret key rate. Therefore, this imperfect mismatch can open a loophole for Eve to perform attacks in practical systems. To close this loophole, we design a scheme at Bob to monitor the pulse widths of both the signal and the local oscillator, and to reshape the waveform of the local oscillator so that the two lights are matched again. This method eliminates the adverse effects caused by pulse width mismatch and effectively resists Eve's attacks which exploit this loophole.
Related papers
- Verifying Closed-Loop Contractivity of Learning-Based Controllers via Partitioning [52.23804865017831]
We address the problem of verifying closed-loop contraction in nonlinear control systems whose controller and contraction metric are both parameterized by neural networks.<n>We derive a tractable and scalable sufficient condition for closed-loop contractivity that reduces to checking that the dominant eigenvalue of a symmetric Metzler matrix is nonpositive.
arXiv Detail & Related papers (2025-12-01T23:06:56Z) - Continuous-variable Measurement Device Independent MIMO Quantum Key Distribution for THz Communications [10.446220662978272]
This paper explores a CV measurement-device-independent (MDI) QKD system operating at terahertz (THz)<n>In this system, measurement is delegated to an untrusted third party, Charlie, rather than the receiver, eliminating all detector attacks.<n>The proposed protocol offers a scalable solution for secure quantum communications in next-generation wireless networks.
arXiv Detail & Related papers (2025-11-07T06:52:28Z) - Quantum Wavefront Correction via Machine Learning for Satellite-to-Earth CV-QKD [0.456504487386796]
State-of-the-art free-space continuous-variable quantum key distribution (CV-QKD) protocols use phase reference pulses to modulate the wavefront of a real local oscillator at the receiver.<n>It is normally assumed that the wavefront distortion in these phase reference pulses is identical to the wavefront distortion in the quantum signals, which are multiplexed during transmission.<n>In many real-world deployments, there can exist a relative wavefront error (WFE) between the reference pulses and quantum signals, which can severely limit secure key transfer in satellite-to-Earth CV-QKD.<n>We
arXiv Detail & Related papers (2025-08-14T04:03:07Z) - Quantum hacking: Induced-photorefraction attack on a practical continuous-variable quantum key distribution system [12.232821041222591]
We explore a new security loophole in a practical continuous-variable quantum key distribution (CVQKD) system, which is opened by the photorefractive effect of lithium niobate-based (LN-based) modulators.
We propose a quantum hacking strategy, i.e., the induced-photorefraction attack, which utilizes the induced photorefraction on the LN-based modulators to hide the classical intercept-resend attack.
arXiv Detail & Related papers (2024-09-12T13:00:09Z) - Security Loophole Induced by Photorefractive Effect in Continous-variable Quantum Key Distribution System [4.7922744779403015]
We analyzed the security loophole of CVQKD under the photorefractive effect (PE)
It is found that the refractive index change of modulators because of PE may lead to an overestimate or underestimate of the final secret key rate.
arXiv Detail & Related papers (2024-08-31T16:25:54Z) - Eavesdropper localization for quantum and classical channels via
nonlinear scattering [58.720142291102135]
Quantum key distribution (QKD) offers theoretical security based on the laws of physics.
We present a novel approach to eavesdropper location that can be employed in quantum as well as classical channels.
We demonstrate that our approach outperforms conventional OTDR in the task of localizing an evanescent outcoupling of 1% with cm precision inside standard optical fibers.
arXiv Detail & Related papers (2023-06-25T21:06:27Z) - Qubit readouts enabled by qubit cloaking [49.1574468325115]
Time-dependent drives play a crucial role in quantum computing efforts.
They enable single-qubit control, entangling logical operations, as well as qubit readout.
Qubit cloaking was introduced in Lled'o, Dassonneville, et al.
arXiv Detail & Related papers (2023-05-01T15:58:25Z) - Autonomous coherence protection of a two-level system in a fluctuating
environment [68.8204255655161]
We re-examine a scheme originally intended to remove the effects of static Doppler broadening from an ensemble of non-interacting two-level systems (qubits)
We demonstrate that this scheme is far more powerful and can also protect a single (or even an ensemble) qubit's energy levels from noise which depends on both time and space.
arXiv Detail & Related papers (2023-02-08T01:44:30Z) - Robust Control for Dynamical Systems With Non-Gaussian Noise via Formal
Abstractions [59.605246463200736]
We present a novel controller synthesis method that does not rely on any explicit representation of the noise distributions.
First, we abstract the continuous control system into a finite-state model that captures noise by probabilistic transitions between discrete states.
We use state-of-the-art verification techniques to provide guarantees on the interval Markov decision process and compute a controller for which these guarantees carry over to the original control system.
arXiv Detail & Related papers (2023-01-04T10:40:30Z) - Verifiable homodyne measurement for detecting non-local properies of
light [4.396860522241306]
homodyne detection is one of the most basic tools for identifying the quantum state of light.
It has been used to detect useful non-local properties, such as entanglement for the quantum teleportation.
We present an alternative scheme that works as the homodyne detection to detect the non-local properties of light in a verifiable manner.
arXiv Detail & Related papers (2022-12-21T11:58:01Z) - Phase-reference intensity attack on continuous-variable quantum key
distribution with a real local oscillator [13.545550481599525]
We show that precisely monitoring the intensity of the phase-reference pulse in real-time is an essential countermeasure to prevent the proposed attacks.
An intensity-monitoring scheme for the phase-reference pulse is proposed to strengthen the security of the practical LLO CV-QKD system.
arXiv Detail & Related papers (2021-11-18T06:41:00Z) - Performance of teleportation-based error correction circuits for bosonic
codes with noisy measurements [58.720142291102135]
We analyze the error-correction capabilities of rotation-symmetric codes using a teleportation-based error-correction circuit.
We find that with the currently achievable measurement efficiencies in microwave optics, bosonic rotation codes undergo a substantial decrease in their break-even potential.
arXiv Detail & Related papers (2021-08-02T16:12:13Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.