Exploiting the Trusted Phase Noise Model in CV-QKD

The threat actor (Eve) manipulates the classical signal used for phase-reference alignment in CV-QKD systems, exploiting the trusted phase noise model to increase correlations with the secret key while masking her influence.


Literature

[Ren2019] S. Ren, R. Kumar, A. Wonfor, X. Tang, R. Penty, and I. White. "Reference pulse attack on continuous variable quantum key distribution with local local oscillator under trusted phase noise" In: J. Opt. Soc. Am. B 36, B7–B15. (2019) 10.1364/JOSAB.36.0000B7.
[Ren2019a] S. Ren, R. Kumar, A. Wonfor, X. Tang, R. Penty, and I. White. "Noise and Security Analysis of Trusted Phase Noise Continuous Variable Quantum Key Distribution using a Local Local Oscillator" In: 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes, France, 2019, pp. 1-5. (2019) 10.1109/SPAWC.2019.8815501.
[Shao2022] Y. Shao, Y. Li, H. Wang, Y. Pan, Y. Pi, Y. Zhang, W. Huang, and B. Xu. "Phasereference-intensity attack on continuous-variable quantum key distribution with a local local oscillator" In: Phys. Rev. A 105, 032601. (2022) 10.1103/PhysRevA.105. 032601.

QID: A-0103
Tier: T0
Type: Hybrid
Tactic: Initial Access
Created: 2024-08-19
Updated: 2024-08-19

Technique → Countermeasures

List of countermeasures applicable to this technique.

Items: 1
Description Countermeasure

Using an upgraded trusted-phase-noise model