358 research outputs found
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
Unconditional security proofs of various quantum key distribution (QKD)
protocols are built on idealized assumptions. One key assumption is: the sender
(Alice) can prepare the required quantum states without errors. However, such
an assumption may be violated in a practical QKD system. In this paper, we
experimentally demonstrate a technically feasible "intercept-and-resend" attack
that exploits such a security loophole in a commercial "plug & play" QKD
system. The resulting quantum bit error rate is 19.7%, which is below the
proven secure bound of 20.0% for the BB84 protocol. The attack we utilize is
the phase-remapping attack (C.-H. F. Fung, et al., Phys. Rev. A, 75, 32314,
2007) proposed by our group.Comment: 16 pages, 6 figure
Quantum Eavesdropping without Interception: An Attack Exploiting the Dead Time of Single Photon Detectors
The security of quantum key distribution (QKD) can easily be obscured if the
eavesdropper can utilize technical imperfections of the actual implementation.
Here we describe and experimentally demonstrate a very simple but highly
effective attack which even does not need to intercept the quantum channel at
all. Only by exploiting the dead time effect of single photon detectors the
eavesdropper is able to gain (asymptotically) full information about the
generated keys without being detected by state-of-the-art QKD protocols. In our
experiment, the eavesdropper inferred up to 98.8% of the key correctly, without
increasing the bit error rate between Alice and Bob significantly. Yet, we find
an evenly simple and effective countermeasure to inhibit this and similar
attacks
Controlling a superconducting nanowire single-photon detector using tailored bright illumination
We experimentally demonstrate that a superconducting nanowire single-photon
detector is deterministically controllable by bright illumination. We found
that bright light can temporarily make a large fraction of the nanowire length
normally-conductive, can extend deadtime after a normal photon detection, and
can cause a hotspot formation during the deadtime with a highly nonlinear
sensitivity. In result, although based on different physics, the
superconducting detector turns out to be controllable by virtually the same
techniques as avalanche photodiode detectors. As demonstrated earlier, when
such detectors are used in a quantum key distribution system, this allows an
eavesdropper to launch a detector control attack to capture the full secret key
without being revealed by to many errors in the key.Comment: Expanded discussions, updated references. 9 pages, 8 figure
Detector decoy quantum key distribution
Photon number resolving detectors can enhance the performance of many
practical quantum cryptographic setups. In this paper, we employ a simple
method to estimate the statistics provided by such a photon number resolving
detector using only a threshold detector together with a variable attenuator.
This idea is similar in spirit to that of the decoy state technique, and is
specially suited for those scenarios where only a few parameters of the photon
number statistics of the incoming signals have to be estimated. As an
illustration of the potential applicability of the method in quantum
communication protocols, we use it to prove security of an entanglement based
quantum key distribution scheme with an untrusted source without the need of a
squash model and by solely using this extra idea. In this sense, this detector
decoy method can be seen as a different conceptual approach to adapt a single
photon security proof to its physical, full optical implementation. We show
that in this scenario the legitimate users can now even discard the double
click events from the raw key data without compromising the security of the
scheme, and we present simulations on the performance of the BB84 and the
6-state quantum key distribution protocols.Comment: 27 pages, 7 figure
Quantum key distribution with hacking countermeasures and long term field trial
Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered
Experimental measurement-device-independent quantum digital signatures
The development of quantum networks will be paramount towards practical and secure telecommunications. These networks will need to sign and distribute information between many parties with information-Theoretic security, requiring both quantum digital signatures (QDS) and quantum key distribution (QKD). Here, we introduce and experimentally realise a quantum network architecture, where the nodes are fully connected using a minimum amount of physical links. The central node of the network can act either as a totally untrusted relay, connecting the end users via the recently introduced measurement-device-independent (MDI)-QKD, or as a trusted recipient directly communicating with the end users via QKD. Using this network, we perform a proof-of-principle demonstration of QDS mediated by MDI-QKD. For that, we devised an efficient protocol to distil multiple signatures from the same block of data, thus reducing the statistical fluctuations in the sample and greatly enhancing the final QDS rate in the finite-size scenario
Experimental plug&play quantum coin flipping
Performing complex cryptographic tasks will be an essential element in future
quantum communication networks. These tasks are based on a handful of
fundamental primitives, such as coin flipping, where two distrustful parties
wish to agree on a randomly generated bit. Although it is known that quantum
versions of these primitives can offer information-theoretic security
advantages with respect to classical protocols, a demonstration of such an
advantage in a practical communication scenario has remained elusive. Here, we
experimentally implement a quantum coin flipping protocol that performs
strictly better than classically possible over a distance suitable for
communication over metropolitan area optical networks. The implementation is
based on a practical plug&play system, designed for quantum key distribution.
We also show how to combine our protocol with coin flipping protocols that are
almost perfectly secure against bounded adversaries, hence enhancing them with
a level of information-theoretic security. Our results offer a powerful toolbox
for future secure quantum communications.Comment: Version 2, 19 pages including detailed security analysi
Field test of quantum key distribution in the Tokyo QKD Network
A novel secure communication network with quantum key distribution in a
metropolitan area is reported. Different QKD schemes are integrated to
demonstrate secure TV conferencing over a distance of 45km, stable long-term
operation, and application to secure mobile phones.Comment: 21 pages, 19 figure
Memory-assisted measurement-device-independent quantum key distribution
A protocol with the potential of beating the existing distance records for conventional quantum key distribution (QKD) systems is proposed. It borrows ideas from quantum repeaters by using memories in the middle of the link, and that of measurement-device-independent QKD, which only requires optical source equipment at the users end. For certain memories with short access times, our scheme allows a higher repetition rate than that of quantum repeaters with single-mode memories, thereby requiring lower coherence times. By accounting for various sources of nonideality, such as memory decoherence, dark counts, misalignment errors, and background noise, as well as timing issues with memories, we develop a mathematical framework within which we can compare QKD systems with and without memories. In particular, we show that with the state-of-the-art technology for quantum memories, it is potentially possible to devise memory-assisted QKD systems that, at certain distances of practical interest, outperform current QKD implementations
Elevated phosphorylation and activation of PDK-1/AKT pathway in human breast cancer
Activation of kinases signalling pathways contributes to various malignant phenotypes in human cancers, including breast tumour. To examine the possible activation of these signalling molecules, we examined the phosphorylation status in 12 protein kinases and transcription factors in normal primary human mammary epithelial cells, telomerase-immortalised human breast epithelial cell line, and two breast cancer lines, MDA-MB-468 and MCF-7, using Kinexus phosphorylated protein screening assays. The phosphorylation of FAK, mTOR, p70S6K, and PDK-1 were elevated in both breast cancer cell lines, whereas the phosphorylation of AKT, EGFR, ErbB2/Her2, PDGFR, Shc, and Stat3 were elevated in only one breast cancer line compared to normal primary mammary epithelial cells and telomerase-immortalised breast epithelial cells. The same findings were confirmed by Western blotting and by kinase assays. We further substantiated the phosphorylation status of these molecules in tissue microarray slides containing 89 invasive breast cancer tissues as well as six normal mammary tissues with immunohistochemistry staining using phospho-specific antibodies. Consistent findings were obtained as greater than 70% of invasive breast carcinomas expressed moderate to high levels of phosphorylated PDK-1, AKT, p70S6K, and EGFR. In sharp contrast, phosphorylation of the same proteins was nearly undetectable or was at low levels in normal mammary tissues under the same assay. Elevated phosphorylation of PDK-1, AKT, mTOR, p70S6K, S6, EGFR, and Stat3 were highly associated with invasive breast tumours (P<0.05). Taken together, our results suggest that activation of these kinase pathways by phosphorylation may in part account for molecular pathogenesis of human breast carcinoma. Particularly, moderate to high level of PDK-1 phosphorylation was found in 86% of high-grade metastasised breast tumours. This is the first report demonstrating phosphorylation of PDK-1 is frequently elevated in breast cancer with concomitantly increased phosphorylation of downstream kinases, including AKT, mTOR, p70S6K, S6, and Stat3. This finding thus suggested PDK-1 may promote oncogenesis in part through the activation of AKT and p70S6K and rationalised that PDK-1 as well as downstream components of PDK-1 signalling pathway may be promising therapeutic targets to treat breast cancer
- …