Yiliang Wang, Yi Zheng, Chenlei Fang, Haobin Shi, Wei Pan
{"title":"量子黑客:对实用连续可变量子密钥分发系统的诱导光分攻击","authors":"Yiliang Wang, Yi Zheng, Chenlei Fang, Haobin Shi, Wei Pan","doi":"arxiv-2409.08017","DOIUrl":null,"url":null,"abstract":"We explore a new security loophole in a practical continuous-variable quantum\nkey distribution (CVQKD) system, which is opened by the photorefractive effect\nof lithium niobate-based (LN-based) modulators. By exploiting this loophole, we\npropose a quantum hacking strategy, i.e., the induced-photorefraction attack,\nwhich utilizes the induced photorefraction on the LN-based modulators to hide\nthe classical intercept-resend attack. Specifically, we show that the induced\nphotorefraction can bias the response curve of the LN-based modulator, which\nwill affect the intensity of the modulated signal. Based on the investigation\nof the channel parameter estimation under above influence, we further analyze\nthe secret key rate of the practical CVQKD system. The simulation results\nindicate that the communication parties will overestimate the secret key rate,\nwhich reveals that Eve can actively open the above loophole by launching the\ninduced-photorefraction attack to successfully obtain the secret key\ninformation. To defend against this attack, we can use a random monitoring\nscheme for modulation variance to determine this attack, and use an improving\noptical power limiter to effectively mitigate the irradiation beam. Apart from\nthese countermeasures, we also propose using the Sagnac-based IM to stabilize\nthe practical CVQKD system, which can minimize the above effects.","PeriodicalId":501226,"journal":{"name":"arXiv - PHYS - Quantum Physics","volume":"10 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Quantum hacking: Induced-photorefraction attack on a practical continuous-variable quantum key distribution system\",\"authors\":\"Yiliang Wang, Yi Zheng, Chenlei Fang, Haobin Shi, Wei Pan\",\"doi\":\"arxiv-2409.08017\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We explore a new security loophole in a practical continuous-variable quantum\\nkey distribution (CVQKD) system, which is opened by the photorefractive effect\\nof lithium niobate-based (LN-based) modulators. By exploiting this loophole, we\\npropose a quantum hacking strategy, i.e., the induced-photorefraction attack,\\nwhich utilizes the induced photorefraction on the LN-based modulators to hide\\nthe classical intercept-resend attack. Specifically, we show that the induced\\nphotorefraction can bias the response curve of the LN-based modulator, which\\nwill affect the intensity of the modulated signal. Based on the investigation\\nof the channel parameter estimation under above influence, we further analyze\\nthe secret key rate of the practical CVQKD system. The simulation results\\nindicate that the communication parties will overestimate the secret key rate,\\nwhich reveals that Eve can actively open the above loophole by launching the\\ninduced-photorefraction attack to successfully obtain the secret key\\ninformation. To defend against this attack, we can use a random monitoring\\nscheme for modulation variance to determine this attack, and use an improving\\noptical power limiter to effectively mitigate the irradiation beam. Apart from\\nthese countermeasures, we also propose using the Sagnac-based IM to stabilize\\nthe practical CVQKD system, which can minimize the above effects.\",\"PeriodicalId\":501226,\"journal\":{\"name\":\"arXiv - PHYS - Quantum Physics\",\"volume\":\"10 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - PHYS - Quantum Physics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2409.08017\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - PHYS - Quantum Physics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.08017","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Quantum hacking: Induced-photorefraction attack on a practical continuous-variable quantum key distribution system
We explore a new security loophole in a practical continuous-variable quantum
key distribution (CVQKD) system, which is opened by the photorefractive effect
of lithium niobate-based (LN-based) modulators. By exploiting this loophole, we
propose a quantum hacking strategy, i.e., the induced-photorefraction attack,
which utilizes the induced photorefraction on the LN-based modulators to hide
the classical intercept-resend attack. Specifically, we show that the induced
photorefraction can bias the response curve of the LN-based modulator, which
will affect the intensity of the modulated signal. Based on the investigation
of the channel parameter estimation under above influence, we further analyze
the secret key rate of the practical CVQKD system. The simulation results
indicate that the communication parties will overestimate the secret key rate,
which reveals that Eve can actively open the above loophole by launching the
induced-photorefraction attack to successfully obtain the secret key
information. To defend against this attack, we can use a random monitoring
scheme for modulation variance to determine this attack, and use an improving
optical power limiter to effectively mitigate the irradiation beam. Apart from
these countermeasures, we also propose using the Sagnac-based IM to stabilize
the practical CVQKD system, which can minimize the above effects.