Notice, by using this platform, you agree to the Terms of Use and Privacy Policy.
Exploiting Imperfect Channel Transmittance in CV-QKD
The threat actor (Eve) can exploit an imperfect channel transmittance model in continuous-variable quantum key distribution (CV-QKD) systems to overestimate the secret key length by biasing parameter estimation through intercept-and-resend attacks, leveraging issues like atmospheric turbulence and background noise.
Literature
[Guo2017] | Y. Guo, C. Xie, Q. Liao, W. Zhao, G. Zeng, and D. Huang. "Entanglement-distillation attack on continuous-variable quantum key distribution in a turbulent atmospheric channel" In: Phys. Rev. A 96, 022320. (2017) 10.1103/PhysRevA.96.022320. |
[Huang2019b] | W. Huang, Y. Mao, C. Xie, and D. Huang. "Quantum hacking of free-space continuous-variable quantum key distribution by using a machine-learning technique" In: Phys. Rev. A 100, 012316. (2019) 10.1103/PhysRevA.100.012316. |
Technique → Countermeasures
List of countermeasures applicable to this technique.
Items: 1
Description | Countermeasure |
---|---|
Apply proper quantum channel calibration. Especially for free-space channel. |