2016
DOI: 10.1109/jqe.2016.2611443
|View full text |Cite
|
Sign up to set email alerts
|

Testing Random-Detector-Efficiency Countermeasure in a Commercial System Reveals a Breakable Unrealistic Assumption

Abstract: In the last decade, efforts have been made to reconcile theoretical security with realistic imperfect implementations of quantum key distribution (QKD). Implementable countermeasures are proposed to patch the discovered loopholes. However, certain countermeasures are not as robust as would be expected. In this paper, we present a concrete example of ID Quantique's random-detector-efficiency countermeasure against detector blinding attacks. As a third-party tester, we have found that the first industrial implem… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
68
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
8
1

Relationship

3
6

Authors

Journals

citations
Cited by 76 publications
(68 citation statements)
references
References 40 publications
0
68
0
Order By: Relevance
“…We assume that when D 1 receives a bright pulse of mean photon number μ, it always produces a click, while if the pulse's mean photon number is μ=2, it never produces a click. This behavior has been experimentally confirmed in many detector types [6,8,[39][40][41][42][43][44]. Once D 1 is blinded, Eve performs an intercept-resend attack on every signal sent by Alice.…”
mentioning
confidence: 64%
See 1 more Smart Citation
“…We assume that when D 1 receives a bright pulse of mean photon number μ, it always produces a click, while if the pulse's mean photon number is μ=2, it never produces a click. This behavior has been experimentally confirmed in many detector types [6,8,[39][40][41][42][43][44]. Once D 1 is blinded, Eve performs an intercept-resend attack on every signal sent by Alice.…”
mentioning
confidence: 64%
“…The results are shown in Fig. 2(a) [44]. For a particular blinding power P B , each point in the solid (dashed) curves shown in the figure represents the maximum (minimum) value of trigger pulse energy E T for which the detection efficiency η det is 0 (1).…”
mentioning
confidence: 99%
“…The outcome of such attack on a particular QKD system -either denial of service or security breach -depends on a multitude of factors difficult to predict in advance, and is only possible to ascertain by experimental testing. (Other examples of attacks in this class are detector control attacks [6,12,[16][17][18][19][20][21][22][23] and timing attacks [3-5, 8, 14]. To give a contrary example, a photon number splitting attack [33,34] has a well understood physical model, and its outcome can be predicted theoretically based on system design and specifications.…”
Section: Statistical Risk Estimatementioning
confidence: 99%
“…When the continuous-wave (CW) blinding light enters the VA-SPD, it is first modulated by the VA into full power or half power as the attenuation value is randomly set to 0 dB or 3 dB. In order to always blind the SPD, the modulated half power should be above the blinding power of the SPD, which is typically about dozens of microwatt [51]. After the modulated blinding light hits the avalanche photodiode (APD), it will create a modulated train of photocurrent.…”
Section: Effectiveness Against the Attack With Blinding Lightmentioning
confidence: 99%