Notice, by using this platform, you agree to the Terms of Use and Privacy Policy.
Exploiting the Trusted Phase Noise Model in CV-QKD
The threat actor (Eve) manipulates the classical signal used for phase-reference alignment in CV-QKD systems, exploiting the trusted phase noise model to increase correlations with the secret key while masking her influence.
Literature
[Ren2019] | S. Ren, R. Kumar, A. Wonfor, X. Tang, R. Penty, and I. White. "Reference pulse attack on continuous variable quantum key distribution with local local oscillator under trusted phase noise" In: J. Opt. Soc. Am. B 36, B7–B15. (2019) 10.1364/JOSAB.36.0000B7. |
[Ren2019a] | S. Ren, R. Kumar, A. Wonfor, X. Tang, R. Penty, and I. White. "Noise and Security Analysis of Trusted Phase Noise Continuous Variable Quantum Key Distribution using a Local Local Oscillator" In: 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes, France, 2019, pp. 1-5. (2019) 10.1109/SPAWC.2019.8815501. |
[Shao2022] | Y. Shao, Y. Li, H. Wang, Y. Pan, Y. Pi, Y. Zhang, W. Huang, and B. Xu. "Phasereference-intensity attack on continuous-variable quantum key distribution with a local local oscillator" In: Phys. Rev. A 105, 032601. (2022) 10.1103/PhysRevA.105. 032601. |
Technique → Countermeasures
List of countermeasures applicable to this technique.
Items: 1
Description | Countermeasure |
---|---|
Using an upgraded trusted-phase-noise model |