1,395 research outputs found

    Effect of source tampering in the security of quantum cryptography

    Get PDF
    The security of source has become an increasingly important issue in quantum cryptography. Based on the framework of measurement-device-independent quantum-key-distribution (MDI-QKD), the source becomes the only region exploitable by a potential eavesdropper (Eve). Phase randomization is a cornerstone assumption in most discrete-variable (DV-) quantum communication protocols (e.g., QKD, quantum coin tossing, weak coherent state blind quantum computing, and so on), and the violation of such an assumption is thus fatal to the security of those protocols. In this paper, we show a simple quantum hacking strategy, with commercial and homemade pulsed lasers, by Eve that allows her to actively tamper with the source and violate such an assumption, without leaving a trace afterwards. Furthermore, our attack may also be valid for continuous-variable (CV-) QKD, which is another main class of QKD protocol, since, excepting the phase random assumption, other parameters (e.g., intensity) could also be changed, which directly determine the security of CV-QKD.Comment: 9 pages, 6 figure

    Effects of losses in the hybrid atom-light interferometer

    Get PDF
    Enhanced Raman scattering can be obtained by injecting a seeded light field which is correlated with the initially prepared collective atomic excitation. This Raman amplification process can be used to realize atom-light hybrid interferometer. We numerically calculate the phase sensitivities and the signal-to-noise ratios of this interferometer with the method of homodyne detection and intensity detection, and give their differences between this two methods. In the presence of loss of light field and atomic decoherence the measure precision will be reduced which can be explained by the break of the intermode decorrelation conditions of output modesComment: 9 pages, 7 figure

    Measurement-device-independent quantum key distribution with uncharacterized qubit sources

    Get PDF
    Measurement-device-independent quantum key distribution (MDIQKD) is proposed to be secure against any possible detection attacks. The security of the original proposal relies on the assumption that the legitimate users can fully characterize the encoding systems including sources. Here, we propose a MDIQKD protocol where we allow uncharacterized encoding systems as long as qubit sources are used. A security proof of the MDIQKD protocol is presented that does not need the knowledge of the encoding states. Simulation results show that the scheme is practical
    • …
    corecore