1,395 research outputs found
Effect of source tampering in the security of quantum cryptography
The security of source has become an increasingly important issue in quantum
cryptography. Based on the framework of measurement-device-independent
quantum-key-distribution (MDI-QKD), the source becomes the only region
exploitable by a potential eavesdropper (Eve). Phase randomization is a
cornerstone assumption in most discrete-variable (DV-) quantum communication
protocols (e.g., QKD, quantum coin tossing, weak coherent state blind quantum
computing, and so on), and the violation of such an assumption is thus fatal to
the security of those protocols. In this paper, we show a simple quantum
hacking strategy, with commercial and homemade pulsed lasers, by Eve that
allows her to actively tamper with the source and violate such an assumption,
without leaving a trace afterwards. Furthermore, our attack may also be valid
for continuous-variable (CV-) QKD, which is another main class of QKD protocol,
since, excepting the phase random assumption, other parameters (e.g.,
intensity) could also be changed, which directly determine the security of
CV-QKD.Comment: 9 pages, 6 figure
Effects of losses in the hybrid atom-light interferometer
Enhanced Raman scattering can be obtained by injecting a seeded light field
which is correlated with the initially prepared collective atomic excitation.
This Raman amplification process can be used to realize atom-light hybrid
interferometer. We numerically calculate the phase sensitivities and the
signal-to-noise ratios of this interferometer with the method of homodyne
detection and intensity detection, and give their differences between this two
methods. In the presence of loss of light field and atomic decoherence the
measure precision will be reduced which can be explained by the break of the
intermode decorrelation conditions of output modesComment: 9 pages, 7 figure
Measurement-device-independent quantum key distribution with uncharacterized qubit sources
Measurement-device-independent quantum key distribution (MDIQKD) is proposed
to be secure against any possible detection attacks. The security of the
original proposal relies on the assumption that the legitimate users can fully
characterize the encoding systems including sources. Here, we propose a MDIQKD
protocol where we allow uncharacterized encoding systems as long as qubit
sources are used. A security proof of the MDIQKD protocol is presented that
does not need the knowledge of the encoding states. Simulation results show
that the scheme is practical
- …