2013
DOI: 10.1103/physreva.88.022339
|View full text |Cite
|
Sign up to set email alerts
|

Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems

Abstract: We consider the security of practical continuous-variable quantum key distribution implementation with the local oscillator (LO) fluctuating in time, which opens a loophole for Eve to intercept the secret key. We show that Eve can simulate this fluctuation to hide her Gaussian collective attack by reducing the intensity of the LO. Numerical simulations demonstrate that, if Bob does not monitor the LO intensity and does not scale his measurements with the instantaneous intensity values of LO, the secret key rat… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
101
0
1

Year Published

2014
2014
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 189 publications
(102 citation statements)
references
References 31 publications
0
101
0
1
Order By: Relevance
“…(22). However, it is unsecured in evidence [17]. Alice and Bob cannot discover the partial information intercepted by Eve under the LOIA.…”
Section: Direct Reconciliationmentioning
confidence: 93%
See 2 more Smart Citations
“…(22). However, it is unsecured in evidence [17]. Alice and Bob cannot discover the partial information intercepted by Eve under the LOIA.…”
Section: Direct Reconciliationmentioning
confidence: 93%
“…One is to attack the signal beam with a traditional Gaussian collective attack. The other is to attack the LO beam with an intensity attenuation [17] which is a non-changing phase attenuator A shown in Fig. 1 …”
Section: The Eb Scheme With Loiamentioning
confidence: 99%
See 1 more Smart Citation
“…A recent demonstration of one-way GMCS CVQKD has been achieved over 150 km of optical fiber by controlling excess noise [12]. However, the ignorance of the nonlocal arrangement of LO will lead to wavelength attacks [14], calibration attacks [15] and LO fluctuation attacks [16], which are all related to the loopholes of LO. Therefore, self-referenced CVQKD without sending an LO is proposed, and it can effectively remove the loopholes introduced by the LO transmission [17].…”
Section: Introductionmentioning
confidence: 99%
“…While the theoretical security of CV-QKD protocols has been established [12,[15][16][17], the study of practical security of CV-QKD devices is far from sufficient (see for example, [18][19][20][21][22][23]). This is mostly due to the relative youth of the technology.…”
Section: Introductionmentioning
confidence: 99%