欺骗状态BB84协议中相位调制器的不完善准备和木马攻击

IF 2.2 3区 物理与天体物理 Q2 OPTICS
Aleksei Reutov
{"title":"欺骗状态BB84协议中相位调制器的不完善准备和木马攻击","authors":"Aleksei Reutov","doi":"10.1016/j.optcom.2025.132175","DOIUrl":null,"url":null,"abstract":"<div><div>Quantum key distribution (QKD) provides a theoretically secure method for cryptographic key exchange by leveraging quantum mechanics, but practical implementations face vulnerabilities such as Trojan attack on phase modulators. This work analyzes the security of QKD systems under such attacks, considering both ideal and imperfect state preparation scenarios. The Trojan attack model is generalized to arbitrary states of probing pulses and conservative bounds of information leakage through side-channel of special form are introduced. The quantum coin imbalance, a critical security parameter, remains low (on the order of <span><math><mrow><mn>1</mn><msup><mrow><mn>0</mn></mrow><mrow><mo>−</mo><mn>7</mn></mrow></msup></mrow></math></span> for ideal state preparation and <span><math><mrow><mn>1</mn><msup><mrow><mn>0</mn></mrow><mrow><mo>−</mo><mn>5</mn></mrow></msup></mrow></math></span> for imperfect preparation) with this new approach and presence additional hardware passive countermeasures. Numerical simulations confirm nonzero secure key rate at distances over 100 km through optical fiber channel.</div></div>","PeriodicalId":19586,"journal":{"name":"Optics Communications","volume":"593 ","pages":"Article 132175"},"PeriodicalIF":2.2000,"publicationDate":"2025-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Imperfect preparation and Trojan attack on the phase modulator in the decoy-state BB84 protocol\",\"authors\":\"Aleksei Reutov\",\"doi\":\"10.1016/j.optcom.2025.132175\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Quantum key distribution (QKD) provides a theoretically secure method for cryptographic key exchange by leveraging quantum mechanics, but practical implementations face vulnerabilities such as Trojan attack on phase modulators. This work analyzes the security of QKD systems under such attacks, considering both ideal and imperfect state preparation scenarios. The Trojan attack model is generalized to arbitrary states of probing pulses and conservative bounds of information leakage through side-channel of special form are introduced. The quantum coin imbalance, a critical security parameter, remains low (on the order of <span><math><mrow><mn>1</mn><msup><mrow><mn>0</mn></mrow><mrow><mo>−</mo><mn>7</mn></mrow></msup></mrow></math></span> for ideal state preparation and <span><math><mrow><mn>1</mn><msup><mrow><mn>0</mn></mrow><mrow><mo>−</mo><mn>5</mn></mrow></msup></mrow></math></span> for imperfect preparation) with this new approach and presence additional hardware passive countermeasures. Numerical simulations confirm nonzero secure key rate at distances over 100 km through optical fiber channel.</div></div>\",\"PeriodicalId\":19586,\"journal\":{\"name\":\"Optics Communications\",\"volume\":\"593 \",\"pages\":\"Article 132175\"},\"PeriodicalIF\":2.2000,\"publicationDate\":\"2025-07-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Optics Communications\",\"FirstCategoryId\":\"101\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0030401825007035\",\"RegionNum\":3,\"RegionCategory\":\"物理与天体物理\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"OPTICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Optics Communications","FirstCategoryId":"101","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0030401825007035","RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"OPTICS","Score":null,"Total":0}
引用次数: 0

摘要

量子密钥分发(QKD)利用量子力学为加密密钥交换提供了一种理论上安全的方法,但在实际实现中存在相位调制器受到特洛伊木马攻击等漏洞。本文分析了QKD系统在这种攻击下的安全性,考虑了理想和不完美的状态准备场景。将木马攻击模型推广到探测脉冲的任意状态,并引入了特殊形式侧信道信息泄漏的保守界。采用这种新方法并存在额外的硬件被动对策,量子币不平衡(一个关键的安全参数)仍然很低(在理想状态准备时为10−7,在不完全准备时为10−5)。数值模拟证实了光纤通道在100公里以上距离上的非零安全密钥速率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Imperfect preparation and Trojan attack on the phase modulator in the decoy-state BB84 protocol
Quantum key distribution (QKD) provides a theoretically secure method for cryptographic key exchange by leveraging quantum mechanics, but practical implementations face vulnerabilities such as Trojan attack on phase modulators. This work analyzes the security of QKD systems under such attacks, considering both ideal and imperfect state preparation scenarios. The Trojan attack model is generalized to arbitrary states of probing pulses and conservative bounds of information leakage through side-channel of special form are introduced. The quantum coin imbalance, a critical security parameter, remains low (on the order of 107 for ideal state preparation and 105 for imperfect preparation) with this new approach and presence additional hardware passive countermeasures. Numerical simulations confirm nonzero secure key rate at distances over 100 km through optical fiber channel.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Optics Communications
Optics Communications 物理-光学
CiteScore
5.10
自引率
8.30%
发文量
681
审稿时长
38 days
期刊介绍: Optics Communications invites original and timely contributions containing new results in various fields of optics and photonics. The journal considers theoretical and experimental research in areas ranging from the fundamental properties of light to technological applications. Topics covered include classical and quantum optics, optical physics and light-matter interactions, lasers, imaging, guided-wave optics and optical information processing. Manuscripts should offer clear evidence of novelty and significance. Papers concentrating on mathematical and computational issues, with limited connection to optics, are not suitable for publication in the Journal. Similarly, small technical advances, or papers concerned only with engineering applications or issues of materials science fall outside the journal scope.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信