Attacks on Fixed Apparatus Quantum Key Distribution Schemes

We consider quantum key distribution implementations in which the receiver's apparatus is fixed and does not depend on his choice of basis at each qubit transmission. We show that, although theoretical quantum key distribution is proven secure, such implementations are totally insecure against a strong eavesdropper that has one-time (single) access to the receiver's equipment. The attack we present here, the "fixed-apparatus attack" causes a potential risk to the usefulness of several recent implementations.

[1]  Kathy P. Wheeler,et al.  Reviews of Modern Physics , 2013 .

[2]  October I Physical Review Letters , 2022 .

[3]  C. M. Simmons,et al.  Practical free-space quantum key distribution over 1 km , 1998 .

[4]  Richard J. Hughes,et al.  Practical free-space quantum key distribution over 10 km in daylight and at night , 2002, quant-ph/0206092.

[5]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[6]  P. Grangier,et al.  Experimental open-air quantum key distribution with a single-photon source , 2004, quant-ph/0402110.

[7]  高橋 秀俊,et al.  Japanese Journal of Applied Physics , 1962, Nature.

[8]  K. Stetson,et al.  Progress in optics , 1980, IEEE Journal of Quantum Electronics.

[9]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[10]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.

[11]  Richard J. Hughes,et al.  Quantum key distribution over a 48 km optical fibre network , 1999, quant-ph/9904038.

[12]  J.-W. Park,et al.  No-Clicking Event in the Quantum Key Distribution , 2004 .

[13]  Ran Gelles,et al.  On the Security of Interferometric Quantum Key Distribution , 2011, TPNC.

[14]  W. Marsden I and J , 2012 .

[15]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[16]  Alexander V. Sergienko,et al.  Entangled States in Quantum Key Distribution , 2006 .

[17]  R. Rosenfeld Nature , 2009, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.

[18]  T. Hatanaka,et al.  Planar lightwave circuits for quantum cryptographic systems , 2003, quant-ph/0307074.

[19]  Daowen Qiu,et al.  Semiquantum-key distribution using less than four quantum states , 2009 .

[20]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[21]  Electronics Letters , 1965, Nature.

[22]  M. Dušek,et al.  Chapter 5 - Quantum cryptography , 2006, quant-ph/0601207.

[23]  Tal Mor,et al.  Quantum Key Distribution with Classical Bob , 2007, 2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM'07).

[24]  N. Gisin,et al.  Experimental Demonstration of Quantum Cryptography Using Polarized Photons in Optical Fibre over More than 1 km , 1993 .

[25]  Peterson,et al.  Free space quantum key distribution in daylight , 2002, QELS 2002.

[26]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[27]  P R Tapster,et al.  erratum , 2002, Nature.

[28]  T. Mor,et al.  Quantum-Space Attacks , 2007, 0711.3019.

[29]  Chip Elliott,et al.  Quantum cryptography in practice , 2003, SIGCOMM '03.

[30]  Gerhard Goos,et al.  Theory and Practice of Natural Computing , 2012, Lecture Notes in Computer Science.

[31]  B. Hong,et al.  Journal of the Korean Physical Society: Preface , 2003 .

[32]  J. Rarity,et al.  Ground to satellite secure key exchange using quantum cryptography , 2002 .

[33]  P. Townsend Secure key distribution system based on quantum cryptography , 1994 .

[34]  N. Gisin,et al.  Quantum cryptography over 23 km in installed under-lake telecom fibre , 1996 .

[35]  Swee-Ping Chia,et al.  AIP Conference Proceedings , 2008 .

[36]  M. Teich,et al.  Decoherence-free subspaces in quantum key distribution. , 2003, Physical review letters.

[37]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[38]  Hoi-Kwong Lo,et al.  Introduction to Quantum Computation Information , 2002 .

[39]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[40]  Dag R. Hjelme,et al.  Faked states attack on quantum cryptosystems , 2005 .

[41]  Yoshihiro Nambu,et al.  BB84 Quantum Key Distribution System Based on Silica-Based Planar Lightwave Circuits , 2004, quant-ph/0404015.