Notice, by using this platform, you agree to the Terms of Use and Privacy Policy.
Wavelength-Dependent Beamsplitter Attack on CV-QKD
The threat actor (Eve) exploits the wavelength dependence of the beamsplitter in the receiver's (Bob's) Continuous-Variable (CV) QKD receiver to control measurement results and mask the noise added by an intercept-and-resend attack.
Literature
[Huang2013] | J. Huang, C. Weedbrook, Z. Yin, S. Wang, H. Li, W. Chen, G. Guo, and Z. Han. "Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack" In: Phys. Rev. A 87, 062329. (2013) 10.1103/PhysRevA.87.062329. |
[Huang2014] | J. Huang, S. Kunz-Jacques, P. Jouguet, C. Weedbrook, Z. Yin, S. Wang, W. Chen, G. Guo, and Z. Han. "Quantum hacking on quantum key distribution using homodyne detection" In: Phys. Rev. A 89, 032304. (2014) 10.1103/PhysRevA.89.032304. |
[Li2011] | H. Li, S. Wang, J. Huang, W. Chen, Z. Yin, F. Li, Z. Zhou, D. Liu, Y. Zhang, G. Guo, W. Bao, and Z. Han. "Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources" In: Phys. Rev. A 84, 062308. (2011) 10.1103/PhysRevA.84.062308.. |
[Ma2013] | X. Ma, S. Sun, M. Jiang, and L. Liang. "Wavelength attack on practical continuousvariable quantum-key-distribution system with a heterodyne protocol" In: Phys. Rev. A 87, 052309. (2013) 10.1103/PhysRevA.87.052309. |
[Qi2015] | Bing Qi, Pavel Lougovski, Raphael Pooser, Warren Grice, and Miljko Bobrek. "Generating the Local Oscillator “Locally” in Continuous-Variable Quantum Key Distribution Based on Coherent Detection" In: Phys. Rev. X 5, 041009. (2015) 10.1103/PhysRevX.5.041009. arXiv:1503.00662. |
[Soh2015] | Daniel B. S. Soh, Constantin Brif, Patrick J. Coles, Norbert Luetkenhaus, Ryan M. Camacho, Junji Urayama, and Mohan Sarovar. "Self-referenced continuous-variable quantum key distribution protocol" In: Phys. Rev. X 5, 041010. (2015) 10.1103/PhysRevX.5.041010. arXiv:1503.04763. |
[Tan2021] | X. Tan, Y. Guo, L. Zhang, J. Huang, J. Shi, and D. Huang. "Wavelength attack on atmospheric continuous-variable quantum key distribution" In: Phys. Rev. A 103, 012417. (2021) 10.1103/PhysRevA.103.012417. |
Technique → Countermeasures
List of countermeasures applicable to this technique.
Items: 4
Description | Countermeasure |
---|---|
Using of wavelength filter. |
|
Using spectral monitoring at the receiver. Bob should randomly perform monitoring with and without a wavelength filter [Huang2013]. |
|
Using real-time quadrature measurements with random optical attenuations. |
|
Monitoring of the watchdog against high-intensity manipulation. |