dc.contributor.author | Sun, Shi-Hai | |
dc.contributor.author | Xu, Feihu | |
dc.contributor.author | Jiang, Mu-Sheng | |
dc.contributor.author | Ma, Xiang-Chun | |
dc.contributor.author | Lo, Hoi-Kwong | |
dc.contributor.author | Liang, Lin-Mei | |
dc.date.accessioned | 2015-08-05T11:38:34Z | |
dc.date.available | 2015-08-05T11:38:34Z | |
dc.date.issued | 2015-08 | |
dc.date.submitted | 2015-01 | |
dc.identifier.issn | 1050-2947 | |
dc.identifier.issn | 1094-1622 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/98020 | |
dc.description.abstract | The security of source has become an increasingly important issue in quantum cryptography. Based on the framework of measurement-device-independent quantum key distribution (MDI-QKD), the source becomes the only region exploitable by a potential eavesdropper (Eve). Phase randomization is a cornerstone assumption in most discrete-variable (DV) quantum communication protocols (e.g., QKD, quantum coin tossing, weak-coherent-state blind quantum computing, and so on), and the violation of such an assumption is thus fatal to the security of those protocols. In this paper, we show a simple quantum hacking strategy, with commercial and homemade pulsed lasers, by Eve that allows her to actively tamper with the source and violate such an assumption, without leaving a trace afterwards. Furthermore, our attack may also be valid for continuous-variable (CV) QKD, which is another main class of QKD protocol, since, excepting the phase random assumption, other parameters (e.g., intensity) could also be changed, which directly determine the security of CV-QKD. | en_US |
dc.description.sponsorship | National Natural Science Foundation (China) (Grant 11304391) | en_US |
dc.publisher | American Physical Society | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1103/PhysRevA.92.022304 | en_US |
dc.rights | Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. | en_US |
dc.source | American Physical Society | en_US |
dc.title | Effect of source tampering in the security of quantum cryptography | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Sun, Shi-Hai, Feihu Xu, Mu-Sheng Jiang, Xiang-Chun Ma, Hoi-Kwong Lo, and Lin-Mei Liang. "Effect of source tampering in the security of quantum cryptography." Phys. Rev. A 92, 022304 (August 2015). © 2015 American Physical Society | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Research Laboratory of Electronics | en_US |
dc.contributor.mitauthor | Xu, Feihu | en_US |
dc.relation.journal | Physical Review A | en_US |
dc.eprint.version | Final published version | en_US |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | en_US |
eprint.status | http://purl.org/eprint/status/PeerReviewed | en_US |
dc.date.updated | 2015-08-04T22:00:10Z | |
dc.language.rfc3066 | en | |
dc.rights.holder | American Physical Society | |
dspace.orderedauthors | Sun, Shi-Hai; Xu, Feihu; Jiang, Mu-Sheng; Ma, Xiang-Chun; Lo, Hoi-Kwong; Liang, Lin-Mei | en_US |
dc.identifier.orcid | https://orcid.org/0000-0002-1643-225X | |
mit.license | PUBLISHER_POLICY | en_US |
mit.metadata.status | Complete | |