File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.26421/QIC7.1-2
- Scopus: eid_2-s2.0-33846202211
- WOS: WOS:000243572200003
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Time-shift attack in practical quantum cryptosystems
Title | Time-shift attack in practical quantum cryptosystems |
---|---|
Authors | |
Keywords | Quantum cryptography Single photon detector Eavesdropping |
Issue Date | 2007 |
Publisher | Rinton Press. The Journal's web site is located at http://www.rintonpress.com/journals/qiconline.html |
Citation | Quantum Information and Computation, 2007, v. 7, n. 1-2, p. 73-82 How to Cite? |
Abstract | Recently, a new type of attack, which exploits the efficiency mismatch of two single photon detectors (SPD) in a quantum key distribution (QKD) system, has been proposed. In this paper, we propose another "time-shift" attack that exploits the same imperfection. In our attack, Eve shifts the arrival time of either the signal pulse or the synchronization pulse or both between Alice and Bob. In particular, in a QKD system where Bob employs time-multiplexing technique to detect both bit "0" and bit "1" with the same SPD, Eve, in some circumstances, could acquire full information on the final key without introducing any error. In addition, we prove that if Alice and Bob are unaware of our attack, the final key they share is insecure. We emphasize that our attack is simple and feasible with current technology. Finally, we discuss some counter measures against our and earlier attacks. © Rinton Press. |
Persistent Identifier | http://hdl.handle.net/10722/285912 |
ISSN | 2023 Impact Factor: 0.7 2023 SCImago Journal Rankings: 0.236 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Qi, Bing | - |
dc.contributor.author | Fung, Chi Hang Fred | - |
dc.contributor.author | Lo, Hoi Kwong | - |
dc.contributor.author | Ma, Xiongfeng | - |
dc.date.accessioned | 2020-08-18T04:56:58Z | - |
dc.date.available | 2020-08-18T04:56:58Z | - |
dc.date.issued | 2007 | - |
dc.identifier.citation | Quantum Information and Computation, 2007, v. 7, n. 1-2, p. 73-82 | - |
dc.identifier.issn | 1533-7146 | - |
dc.identifier.uri | http://hdl.handle.net/10722/285912 | - |
dc.description.abstract | Recently, a new type of attack, which exploits the efficiency mismatch of two single photon detectors (SPD) in a quantum key distribution (QKD) system, has been proposed. In this paper, we propose another "time-shift" attack that exploits the same imperfection. In our attack, Eve shifts the arrival time of either the signal pulse or the synchronization pulse or both between Alice and Bob. In particular, in a QKD system where Bob employs time-multiplexing technique to detect both bit "0" and bit "1" with the same SPD, Eve, in some circumstances, could acquire full information on the final key without introducing any error. In addition, we prove that if Alice and Bob are unaware of our attack, the final key they share is insecure. We emphasize that our attack is simple and feasible with current technology. Finally, we discuss some counter measures against our and earlier attacks. © Rinton Press. | - |
dc.language | eng | - |
dc.publisher | Rinton Press. The Journal's web site is located at http://www.rintonpress.com/journals/qiconline.html | - |
dc.relation.ispartof | Quantum Information and Computation | - |
dc.subject | Quantum cryptography | - |
dc.subject | Single photon detector | - |
dc.subject | Eavesdropping | - |
dc.title | Time-shift attack in practical quantum cryptosystems | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.scopus | eid_2-s2.0-33846202211 | - |
dc.identifier.volume | 7 | - |
dc.identifier.issue | 1-2 | - |
dc.identifier.spage | 73 | - |
dc.identifier.epage | 82 | - |
dc.identifier.isi | WOS:000243572200003 | - |
dc.identifier.partofdoi | 10.26421/QIC7.1-2 | - |
dc.identifier.issnl | 1533-7146 | - |