메뉴 건너뛰기




Volumn 7, Issue 1-2, 2007, Pages 73-82

Time-shift attack in practical quantum cryptosystems

Author keywords

Eavesdropping; Quantum cryptography; Single photon detector

Indexed keywords

AVALANCHE PHOTODIODES; PARTICLE BEAMS; PHOTONS;

EID: 33846202211     PISSN: 15337146     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (376)

References (35)
  • 2
    • 0343152990 scopus 로고
    • Quantum cryptography based on Bell's theorem
    • A. K. Ekert, Quantum cryptography based on Bell's theorem, Phys. Rev. Lett. 67 (1991), 661.
    • (1991) Phys. Rev. Lett , vol.67 , pp. 661
    • Ekert, A.K.1
  • 4
    • 3042730516 scopus 로고    scopus 로고
    • Unconditional security in quantum cryptography
    • D. Mayers, Unconditional security in quantum cryptography, J. of ACM 48 (2001), 351-406,
    • (2001) J. of ACM , vol.48 , pp. 351-406
    • Mayers, D.1
  • 5
    • 84955621476 scopus 로고    scopus 로고
    • Preliminary version in Mayers, D. Advances in Cryptology-Proc. Crypto '96, 1109 of Lecture Notes in Computer Science, Koblitz, N. Ed. (Springer-Verlag, New York, 1996), pp. 343-357.
    • Preliminary version in Mayers, D. Advances in Cryptology-Proc. Crypto '96, vol. 1109 of Lecture Notes in Computer Science, Koblitz, N. Ed. (Springer-Verlag, New York, 1996), pp. 343-357.
  • 6
    • 0033605546 scopus 로고    scopus 로고
    • Unconditional security of quantum key distribution over arbitrarily long distances
    • H.-K. Lo and H. F. Chau, Unconditional security of quantum key distribution over arbitrarily long distances, Science 283 (1999), 2050-2056.
    • (1999) Science , vol.283 , pp. 2050-2056
    • Lo, H.-K.1    Chau, H.F.2
  • 7
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the BB84 quantum key distribution protocol
    • P. W. Shor and J. Preskill, Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett. 85 (2000), 441.
    • (2000) Phys. Rev. Lett , vol.85 , pp. 441
    • Shor, P.W.1    Preskill, J.2
  • 9
    • 0035841898 scopus 로고    scopus 로고
    • Faint laser quantum key distribution: Eavesdropping exploiting multiphoton pulses
    • S. Felix, N. Gisin, A. Stefanov, and H. Zbinden, Faint laser quantum key distribution: eavesdropping exploiting multiphoton pulses, J. Mod. Opt. 48 (2001), 2009-2021.
    • (2001) J. Mod. Opt , vol.48 , pp. 2009-2021
    • Felix, S.1    Gisin, N.2    Stefanov, A.3    Zbinden, H.4
  • 11
    • 0347111146 scopus 로고    scopus 로고
    • Security against individual attacks for realistic quantum key distribution
    • N. Lütkenhaus, Security against individual attacks for realistic quantum key distribution, Phys. Rev. A 61(2000), 052304.
    • (2000) Phys. Rev. A , vol.61 , pp. 052304
    • Lütkenhaus, N.1
  • 14
    • 0041415963 scopus 로고    scopus 로고
    • Quantum key distribution with high loss: Toward global secure communication
    • W.-Y. Hwang, Quantum key distribution with high loss: Toward global secure communication, Phys. Rev. Lett. 91 (2003), 057901.
    • (2003) Phys. Rev. Lett , vol.91 , pp. 057901
    • Hwang, W.-Y.1
  • 16
    • 27744479495 scopus 로고    scopus 로고
    • Decoy state quantum key distribution
    • H.-K. Lo, X. Ma, and K. Chen, Decoy state quantum key distribution, Phys. Rev. Lett. 94 (2005), 230504.
    • (2005) Phys. Rev. Lett , vol.94 , pp. 230504
    • Lo, H.-K.1    Ma, X.2    Chen, K.3
  • 17
    • 27744568650 scopus 로고    scopus 로고
    • Beating the photon-number-splitting attack in practical quantum cryptography
    • X.-B. Wang, Beating the photon-number-splitting attack in practical quantum cryptography, Phys. Rev. Lett. 94 (2005), 230503.
    • (2005) Phys. Rev. Lett , vol.94 , pp. 230503
    • Wang, X.-B.1
  • 18
    • 27144453296 scopus 로고    scopus 로고
    • Practical decoy state for quantum key distribution
    • X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, Practical decoy state for quantum key distribution. Phys. Rev. A 72 (2005), 012326.
    • (2005) Phys. Rev. A , vol.72 , pp. 012326
    • Ma, X.1    Qi, B.2    Zhao, Y.3    Lo, H.-K.4
  • 19
    • 27144532069 scopus 로고    scopus 로고
    • Decoy-state protocol for quantum cryptography with four different intensities of coherent light
    • X.-B. Wang, Decoy-state protocol for quantum cryptography with four different intensities of coherent light, Phys. Rev. A 72 (2005), 012322.
    • (2005) Phys. Rev. A , vol.72 , pp. 012322
    • Wang, X.-B.1
  • 21
    • 33344454530 scopus 로고    scopus 로고
    • Experimental quantum key distribution with decoy states
    • Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian, Experimental quantum key distribution with decoy states, Phys. Rev. Lett. 96 (2006), 070502.
    • (2006) Phys. Rev. Lett , vol.96 , pp. 070502
    • Zhao, Y.1    Qi, B.2    Ma, X.3    Lo, H.-K.4    Qian, L.5
  • 22
    • 3142514656 scopus 로고    scopus 로고
    • Photon counting at telecom wavelengths with commercial InGaAs/InP avalanche photodiodes: Current performance
    • G. Ribordy, N. Gisin, O. Guinnard, D. Stucki, M. Wegmuller, and H. Zbinden, Photon counting at telecom wavelengths with commercial InGaAs/InP avalanche photodiodes: current performance, J. Mod. Opt. 51 (2004), 1381-1398.
    • (2004) J. Mod. Opt , vol.51 , pp. 1381-1398
    • Ribordy, G.1    Gisin, N.2    Guinnard, O.3    Stucki, D.4    Wegmuller, M.5    Zbinden, H.6
  • 24
    • 27844566291 scopus 로고    scopus 로고
    • Faked states attack on quantum cryptosystems
    • V. Makarov and D. R. Hjelme, Faked states attack on quantum cryptosystems, J. Mod. Opt. 52 (2005), 691-705.
    • (2005) J. Mod. Opt , vol.52 , pp. 691-705
    • Makarov, V.1    Hjelme, D.R.2
  • 25
    • 0033097504 scopus 로고    scopus 로고
    • Unconditionally secure key agreement and the intrinsic conditional information
    • U. M. Maurer and S. Wolf, Unconditionally secure key agreement and the intrinsic conditional information, IEEE Trans. Inf. Theory 45 (1999), 499-514.
    • (1999) IEEE Trans. Inf. Theory , vol.45 , pp. 499-514
    • Maurer, U.M.1    Wolf, S.2
  • 26
    • 0029357908 scopus 로고
    • Quantum key distribution over distance as long as 30km
    • C. Marand and P. D. Townsend, Quantum key distribution over distance as long as 30km, Opt. Lett. 20 (1995), 1695-1697.
    • (1995) Opt. Lett , vol.20 , pp. 1695-1697
    • Marand, C.1    Townsend, P.D.2
  • 27
    • 4043164377 scopus 로고    scopus 로고
    • Real-time phase tracking in single-photon interferometers
    • V. Makarov, A. Brylevski, and D. R. Hjelme, Real-time phase tracking in single-photon interferometers, App. Opt. 43 (2004), 4385-4392.
    • (2004) App. Opt , vol.43 , pp. 4385-4392
    • Makarov, V.1    Brylevski, A.2    Hjelme, D.R.3
  • 28
    • 0034652057 scopus 로고    scopus 로고
    • Quantum key distribution over a 48km optical fiber network
    • R. J. Hughes, G. L. Morgan, and C. G. Peterson, Quantum key distribution over a 48km optical fiber network, J. Mod. Opt.47(2000), 533-547.
    • (2000) J. Mod. Opt , vol.47 , pp. 533-547
    • Hughes, R.J.1    Morgan, G.L.2    Peterson, C.G.3
  • 29
    • 13544277609 scopus 로고    scopus 로고
    • Continuous operation of a one-way quantum key distribution system over installed telecom fibre
    • Z. L. Yuan and A. J. Shields, Continuous operation of a one-way quantum key distribution system over installed telecom fibre, Opt. Express 13 (2005), 660-665.
    • (2005) Opt. Express , vol.13 , pp. 660-665
    • Yuan, Z.L.1    Shields, A.J.2
  • 30
    • 33846189366 scopus 로고    scopus 로고
    • In the first version, we proposed an attack on this type QKD system by tampering both the synchronization pulse and signal pulse. As pointed out by an anonymous reviewer, in this case. the time-shifted pulse may be modulated by Bob's phase modulator incorrectly
    • In the first version, we proposed an attack on this type QKD system by tampering both the synchronization pulse and signal pulse. As pointed out by an anonymous reviewer, in this case. the time-shifted pulse may be modulated by Bob's phase modulator incorrectly.
  • 31
    • 0028428439 scopus 로고
    • Secure key distribution system based on quantum cryptography
    • P. Townsend, Secure key distribution system based on quantum cryptography, Electr. Lett. 30(1994), 809-811.
    • (1994) Electr. Lett , vol.30 , pp. 809-811
    • Townsend, P.1
  • 32
    • 33846203946 scopus 로고    scopus 로고
    • Secure use of a single single-photon detector in a QKD system
    • US patent application 20050190922
    • M. J. LaGasse, Secure use of a single single-photon detector in a QKD system, US patent application 20050190922 (2005).
    • (2005)
    • LaGasse, M.J.1
  • 33
    • 0035841908 scopus 로고    scopus 로고
    • Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography
    • A. Vakhitov, V. Makarov and D. R. Hjelme, Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography, J. Mod. Opt. 48 (2001), 2023-2038.
    • (2001) J. Mod. Opt , vol.48 , pp. 2023-2038
    • Vakhitov, A.1    Makarov, V.2    Hjelme, D.R.3
  • 35
    • 33846208750 scopus 로고    scopus 로고
    • For example, Alice/Bob may produce one key with QKD system and another key with conventional cryptosystem. They can produce the final key by doing a XOR operation. Eve has to break both the two systems to get the final key.
    • For example, Alice/Bob may produce one key with QKD system and another key with conventional cryptosystem. They can produce the final key by doing a "XOR" operation. Eve has to break both the two systems to get the final key.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.