Experimental quantum cryptography
Journal of Cryptology - Eurocrypt '90
Unconditional security in quantum cryptography
Journal of the ACM (JACM)
Security of quantum key distribution with imperfect devices
Quantum Information & Computation
Unconditionally secure key agreement and the intrinsic conditional information
IEEE Transactions on Information Theory
Security of quantum key distribution with bit and basis dependent detector flaws
Quantum Information & Computation
Security of quantum key distribution using weak coherent states with nonrandom phases
Quantum Information & Computation
Security proof of quantum key distribution with detection efficiency mismatch
Quantum Information & Computation
Efficient device-independent quantum key distribution
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
The security of SARG04 protocol in plug and play QKD system with an untrusted source
Quantum Information & Computation
The general theory of three-party quantum secret sharing protocols over phase-damping channels
Quantum Information Processing
Security of high speed quantum key distribution with finite detector dead time
Quantum Information & Computation
Hi-index | 0.00 |
Recently, a new type of attack, which exploits the efficiency mismatch of two single photon detectors (SPD) in a quantum key distribution (QKD) system, has been proposed. In this paper, we propose another "time-shift" attack that exploits the same imperfection. In our attack, Eve shifts the arrival time of either the signal pulse or the synchronization pulse or both between Alice and Bob. In particular, in a QKD system where Bob employs time-multiplexing technique to detect both bit "0" and bit "1" with the same SPD, Eve, in some circumstances, could acquire full information on the final key without introducing any error. In addition, we prove that if Alice and Bob are unaware of our attack, the final key they share is insecure. We emphasize that our attack is simple and feasible with current technology. Finally, we discuss some counter measures against our and earlier attacks.