Experimental quantum cryptography
Journal of Cryptology - Eurocrypt '90
A proof of the security of quantum key distribution (extended abstract)
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Security of quantum key distribution with imperfect devices
Quantum Information & Computation
Security of quantum key distribution with bit and basis dependent detector flaws
Quantum Information & Computation
The security of SARG04 protocol in plug and play QKD system with an untrusted source
Quantum Information & Computation
Journal of Computational Electronics
Hi-index | 0.01 |
In quantum cryptosystems, variations in detector efficiency can be exploited to stage a successful attack. This happens when the efficiencies of Bob's two detectors are different functions of a control parameter accessible to Eve (e.g., timing of the incoming pulses). It has previously been shown that the Bennett-Brassard 1984 (BB84) protocol is vulnerable to this attack. In this paper, we show that several other protocols and encodings may also be vulnerable. We consider a faked states attack in the case of a partial efficiency mismatch on the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol, and derive the quantum bit error rate as a function of detector efficiencies. Additionally, it is shown how faked states can in principle be constructed for quantum cryptosystems that use a phase-time encoding, the differential phase shift keying (DPSK) and the Ekert protocols.