|
Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., & Makarov, V. (2010). Thermal blinding of gated detectors in quantum cryptography. Opt. Express, 18(26), 27938–27954.
Abstract: It has previously been shown that the gated detectors of two commercially available quantum key distribution (QKD) systems are blindable and controllable by an eavesdropper using continuous-wave illumination and short bright trigger pulses, manipulating voltages in the circuit [L. Lydersen et al., Nat. Photonics DOI:10.1038/nphoton.2010.214]. This allows for an attack eavesdropping the full raw and secret key without increasing the quantum bit error rate (QBER). Here we show how thermal effects in detectors under bright illumination can lead to the same outcome. We demonstrate that the detectors in a commercial QKD system Clavis2 can be blinded by heating the avalanche photo diodes (APDs) using bright illumination, so-called thermal blinding. Further, the detectors can be triggered using short bright pulses once they are blind. For systems with pauses between packet transmission such as the plug-and-play systems, thermal inertia enables Eve to apply the bright blinding illumination before eavesdropping, making her more difficult to catch.
|
|
|
Wiechers, C., Lydersen, L., Wittmann, C., Elser, D., Skaar, J., Marquardt, C., et al. (2011). After-gate attack on a quantum cryptosystem. New J. Phys., 13(1), 14.
Abstract: We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.
|
|
|
Килин, С. Я. (1999). Квантовая информация. УФН, 169(5), 507–527.
Abstract: Новое направление физики – квантовая информация – возникло на стыке квантовой механики, оптики, теории относительности и программирования, дискретной математики, лазерной физики и спектроскопии и включает в себя вопросы квантовых вычислений, квантовых компьютеров, квантовой телепортации и квантовой криптографии, проблемы декогеренции и спектроскопии одиночных молекул и примесных центров. Сообщается о некоторых новых результатах в этой быстро развивающейся области исследований.
|
|
|
Курочкин, Ю. В. (2011). Методы повышения пропускной способности квантовой криптографии. Ph.D. thesis, , .
|
|
|
Esteban, E., & Serna, H. (2009). Quantum key distribution protocol with private-public key. arXiv, , 3.
Abstract: A quantum cryptographic protocol based in public key cryptography combinations and private key cryptography is presented. Unlike the BB84 protocol 1 and its many variants 2,3 two quantum channels are used. The present research does not make reconciliation mechanisms of information to derive the key. A three related system of key distribution are described.
|
|