Decoy States Employment

The Decoy state method enhances security against eavesdropping by interspersing the signal pulses with decoy pulses of varying intensities, thereby confusing potential interceptors.
 


Literature

[Hwang2003] Won-Young Hwang. "Quantum Key Distribution with High Loss: Toward Global Secure Communication" In: Phys. Rev. Lett. 91, 057901. (2003) 10.1103/PhysRevLett.91.057901. arXiv:arXiv:quant-ph/0211153.
[Lizama2012] L. Lizama, J. Mauricio Lopez, E. De Carlos Lopez, and S. Venegas-Andraca. "Enhancing Quantum Key Distribution (QKD) to address quantum hacking" In: 2012 Iberoamerican Conference on Electronics Engineering and Computer Science. Vol. 3. 2012, pp. 80-88. (2012) 10.1016/j.protcy.2012.03.009.
[Lo2004] Hoi-Kwong Lo. "Quantum key distribution with vacua or dim pulses as decoy states" In: Proceedings of 2004 IEEE International Symposium on Information Theory. New York: IEEE Press. p. 137. (2004) 10.1109/ISIT.2004.1365174.
[Lo2005] Hoi-Kwong Lo, Xiongfeng Ma, and Kai Chen. "Decoy State Quantum Key Distribution" In: Phys. Rev. Lett. 94, 230504. (2005) 10.1103/PhysRevLett.94.230504.
[Ma2005] Xiongfeng Ma, Bing Qi, Yi Zhao, and Hoi-Kwong Lo. "Practical decoy state for quantum key distribution" In: Phys. Rev. A 72, 012326. (2005) 10.1103/PhysRevA.72.012326.
[Molotkov2020] S. Molotkov. "Trojan Horse Attacks, Decoy State Method, and Side Channels of Information Leakage in Quantum Cryptography" In: J. Exp. Theor. Phys. 130, 809–832. (2020) 10.1134/S1063776120050064.
[Molotkov2020a] S. Molotkov. "Robustness of Quantum Cryptography Systems with Phase-Time Coding against Active Probing Attacks" In: J. Exp. Theor. Phys. 131, 877–894. (2020) 10.1134/S1063776120110138.
[Wang2005] Xiang-Bin Wang. "Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography" In: Phys. Rev. Lett. 94, 230503. (2005) 10.1103/PhysRevLett.94.230503.

QID: CM-0003
Tier: T0
Type: Quantum
Tactic: Deceive
Created: 2024-03-02
Updated: 2024-05-13

Technique → Countermeasures

List of techniques where this countermeasure can be applied.

Items: 4
Description Technique

These involve sending additional pulses with varying numbers of photons, including single-photon pulses, to detect eavesdropping attempts through statistical analysis of the quantum channel's behavior.

Photon-Number-Splitting (PNS) Attack

Two-decoy state, where one of which is vacuum [Sun2012].  

Partially-Random-Phase Attack

Employ the generalised decoy-state method, which extends the traditional decoy-state approach by considering joint collective measurements [Molotkov2020,Molotkov2020a].

Side Channel Exploitation in Transmitter Imperfections

Sending random non-informational qubits along with the actual qubits to detect the presence of an eavesdropper through changes in the statistics of the outcomes.

Intercept-and-Resend Attack