-
Practical Attacks on Decoy State Quantum Key Distribution Systems with Detector Efficiency Mismatch
Authors:
Fei Yangyang,
Gao Ming,
Wang Weilong,
Li Chaobo,
Ma Zhi
Abstract:
To the active basis choice decoy state quantum key distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on faked states attack, with quantum nondemolition measurement ability to restress the threat of detector efficiency mismatch. Considering that perfect quantum nondemolition measurement ability dose not exist in real life, we also propose…
▽ More
To the active basis choice decoy state quantum key distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on faked states attack, with quantum nondemolition measurement ability to restress the threat of detector efficiency mismatch. Considering that perfect quantum nondemolition measurement ability dose not exist in real life, we also propose a practical attack strategy using photon number resolving detectors. Theoretical analysis and numerical simulation results show that, without changing the channel, our attack strategies are serious threats to decoy state quantum key distribution systems. The eavesdropper may get some information ab out the secret key without causing any alarms. Besides, the lower bound of detector efficiency mismatch to run our modified faked states attack successfully with perfect quantum nondemolition measurement ability is also given out, which provides the producers of quantum key distribution systems with a reference and can be treated as the approximate secure bound of detector efficiency mismatch in decoy state quantum key distribution systems.
△ Less
Submitted 23 July, 2015;
originally announced July 2015.
-
Effect of imperfect Faraday mirrors on security of a Faraday-Michelson quantum cryptography system
Authors:
Wang Weilong,
Gao Ming,
Ma Zhi
Abstract:
The one-way Faraday-Michelson system is a very useful practical quantum cryptography system where Faraday mirrors(FMs) play an important role. In this paper we analyze the security of this system against imperfect FMs. We consider the security loophole caused by the imperfect FMs in Alice's and Bob's security zones. Then we implement a passive Faraday mirror attack in this system. By changing the…
▽ More
The one-way Faraday-Michelson system is a very useful practical quantum cryptography system where Faraday mirrors(FMs) play an important role. In this paper we analyze the security of this system against imperfect FMs. We consider the security loophole caused by the imperfect FMs in Alice's and Bob's security zones. Then we implement a passive Faraday mirror attack in this system. By changing the values of the imperfection parameters of Alice's FMs, we calculate the quantum bit error rate between Alice and Bob induced by Eve and the probability that Eve obtains outcomes successfully. It is shown that the imperfection of one of Alice's two FMs makes the system sensitive to the attack. At last we give a modified key rate as a function of the Faraday mirror imperfections. The security analysis indicates that both Alice's and Bob's imperfect FMs can compromise the secure key.
△ Less
Submitted 28 October, 2013;
originally announced October 2013.
-
Coherent transfer of optical orbital angular momentum in multi-order Raman sideband generation
Authors:
J. Strohaber,
M. Zhi,
A. V. Sokolov,
A. A. Kolomenskii,
G. G. Paulus,
H. A. Schuessler
Abstract:
Experimental results from the generation of Raman sidebands using optical vortices are presented. By generating two sets of sidebands originating from different locations in a Raman active crystal, one set containing optical orbital angular momentum and the other serving as a reference, a Young's double slit experiment was simultaneously realized for each sideband. The interference between the two…
▽ More
Experimental results from the generation of Raman sidebands using optical vortices are presented. By generating two sets of sidebands originating from different locations in a Raman active crystal, one set containing optical orbital angular momentum and the other serving as a reference, a Young's double slit experiment was simultaneously realized for each sideband. The interference between the two sets of sidebands was used to determine the helicity and topological charge in each order. Topological charges in all orders were found to be discrete and follow selection rules predicted by a cascaded Raman process.
△ Less
Submitted 29 May, 2012;
originally announced May 2012.
-
Non-binary Entanglement-assisted Stabilizer Quantum Codes
Authors:
Leng Riguang,
Ma Zhi
Abstract:
In this paper, we show how to construct non-binary entanglement-assisted stabilizer quantum codes by using pre-shared entanglement between the sender and receiver. We also give an algorithm to determine the circuit for non-binary entanglement-assisted stabilizer quantum codes and some illustrated examples. The codes we constructed do not require the dual-containing constraint, and many non-binary…
▽ More
In this paper, we show how to construct non-binary entanglement-assisted stabilizer quantum codes by using pre-shared entanglement between the sender and receiver. We also give an algorithm to determine the circuit for non-binary entanglement-assisted stabilizer quantum codes and some illustrated examples. The codes we constructed do not require the dual-containing constraint, and many non-binary classical codes, like non-binary LDPC codes, which do not satisfy the condition, can be used to construct non-binary entanglement-assisted stabilizer quantum codes.
△ Less
Submitted 30 May, 2011;
originally announced May 2011.