Decoy States Employment
The Decoy state method enhances security against eavesdropping by interspersing the signal pulses with decoy pulses of varying intensities, thereby confusing potential interceptors.
Literature
[Hwang2003] | Won-Young Hwang. "Quantum Key Distribution with High Loss: Toward Global Secure Communication" In: Phys. Rev. Lett. 91, 057901. (2003) 10.1103/PhysRevLett.91.057901. arXiv:arXiv:quant-ph/0211153. |
[Lizama2012] | L. Lizama, J. Mauricio Lopez, E. De Carlos Lopez, and S. Venegas-Andraca. "Enhancing Quantum Key Distribution (QKD) to address quantum hacking" In: 2012 Iberoamerican Conference on Electronics Engineering and Computer Science. Vol. 3. 2012, pp. 80-88. (2012) 10.1016/j.protcy.2012.03.009. |
[Lo2004] | Hoi-Kwong Lo. "Quantum key distribution with vacua or dim pulses as decoy states" In: Proceedings of 2004 IEEE International Symposium on Information Theory. New York: IEEE Press. p. 137. (2004) 10.1109/ISIT.2004.1365174. |
[Lo2005] | Hoi-Kwong Lo, Xiongfeng Ma, and Kai Chen. "Decoy State Quantum Key Distribution" In: Phys. Rev. Lett. 94, 230504. (2005) 10.1103/PhysRevLett.94.230504. |
[Ma2005] | Xiongfeng Ma, Bing Qi, Yi Zhao, and Hoi-Kwong Lo. "Practical decoy state for quantum key distribution" In: Phys. Rev. A 72, 012326. (2005) 10.1103/PhysRevA.72.012326. |
[Molotkov2020] | S. Molotkov. "Trojan Horse Attacks, Decoy State Method, and Side Channels of Information Leakage in Quantum Cryptography" In: J. Exp. Theor. Phys. 130, 809–832. (2020) 10.1134/S1063776120050064. |
[Molotkov2020a] | S. Molotkov. "Robustness of Quantum Cryptography Systems with Phase-Time Coding against Active Probing Attacks" In: J. Exp. Theor. Phys. 131, 877–894. (2020) 10.1134/S1063776120110138. |
[Wang2005] | Xiang-Bin Wang. "Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography" In: Phys. Rev. Lett. 94, 230503. (2005) 10.1103/PhysRevLett.94.230503. |
Technique → Countermeasures
List of techniques where this countermeasure can be applied.
Items: 4
Description | Technique |
---|---|
These involve sending additional pulses with varying numbers of photons, including single-photon pulses, to detect eavesdropping attempts through statistical analysis of the quantum channel's behavior. |
Photon-Number-Splitting (PNS) Attack |
Two-decoy state, where one of which is vacuum [Sun2012]. |
Partially-Random-Phase Attack |
Employ the generalised decoy-state method, which extends the traditional decoy-state approach by considering joint collective measurements [Molotkov2020,Molotkov2020a]. |
Side Channel Exploitation in Transmitter Imperfections |
Sending random non-informational qubits along with the actual qubits to detect the presence of an eavesdropper through changes in the statistics of the outcomes. |
Intercept-and-Resend Attack |