Notice, by using this platform, you agree to the Terms of Use and Privacy Policy.
CV Detector-Control Attack
The threat actor (Eve) injects bright light into the signal port of a CV-QKD receiver (Bob) to saturate the detector electronics, masking other attacks and gaining complete knowledge of the key.
Literature
[Qin2018] | H. Qin, R. Kumar, V. Makarov, and R. Alleaume. "Homodyne-detector-blinding attack in continuous-variable quantum key distribution" In: Phys. Rev. A 98, 012312. (2018) 10.1103/PhysRevA.98.012312. |
Technique → Countermeasures
List of countermeasures applicable to this technique.
Items: 3
Description | Countermeasure |
---|---|
Employ Real-time Quadrature Measurements with Random Optical Attenuations. |
|
Use of watchdog detector. |
|
Employ another QKD protocol. |