Hacking measurement-device-independent quantum key distribution

Feng-Yu Lu,Peng Ye,Shuang Wang,Zhen-Qiang Yin,Rong Wang,Xiao-Juan Huang,Wei Chen,De-Yong He,Guan-Jie Fan-Yuan,ze-hao wang,Guang-can Guo,Zhen-fu Han
DOI: https://doi.org/10.1364/optica.485389
IF: 10.4
2023-04-21
Optica
Abstract:Feng-Yu Lu, Peng Ye, Ze-Hao Wang, Shuang Wang, Zhen-Qiang Yin, Rong Wang, Xiao-Juan Huang, Wei Chen, De-Yong He, Guan-Jie Fan-Yuan, Guang-Can Guo, Zheng-Fu Han Decoy-state measurement-device-independent quantum key distribution (MDI-QKD) is regarded as one of the most promising protocols since it ... [Optica 10, 520-527 (2023)]
optics
What problem does this paper attempt to address?
The paper primarily explores the issue of how to compromise Measurement-Device-Independent Quantum Key Distribution (MDI-QKD) systems. Specifically, the research focuses on how to exploit these vulnerabilities to obtain the final key when the system's decoy state modulation is inaccurate. The main contributions of the paper include: 1. **Proposing a practical attack method**: The authors designed a feasible attack strategy based on the idea of Photon Number Splitting (PNS) attacks, but it only requires general equipment and does not need advanced technologies such as quantum storage or quantum non-destructive detection. 2. **Theoretical analysis**: Detailed theoretical analysis is provided to illustrate which types of modulation errors are advantageous to the attacker and describe how these errors can mislead protocol participants into underestimating the degree of information leakage. 3. **Experimental validation**: The effectiveness of the attack is demonstrated through two experiments. In the first experiment, the decoy state is inaccurately modulated, and the attacker passively exploits this modulation error; in the second experiment, the attacker actively interferes with the sender's (Alice's) modulation process. In both experiments, the attacker is able to successfully obtain almost all of the final key. In summary, this paper attempts to address the security vulnerabilities on the source side (i.e., the sender Alice's equipment) in MDI-QKD systems and demonstrates an attack method that can exploit these vulnerabilities to emphasize the importance of source-side security.