中国物理B ›› 2022, Vol. 31 ›› Issue (12): 120304-120304.doi: 10.1088/1674-1056/ac9b05

• • 上一篇    下一篇

Detecting the possibility of a type of photon number splitting attack in decoy-state quantum key distribution

Xiao-Ming Chen(陈小明)1,2,3, Lei Chen(陈雷)1,2,†, and Ya-Long Yan(阎亚龙)3   

  1. 1 Beijing University of Posts and Telecommunications, Beijing 100876, China;
    2 Beijing Electronic Science and Technology Institute, Beijing 100070, China;
    3 University of Science and Technology of China, Hefei 230026, China
  • 收稿日期:2022-05-09 修回日期:2022-09-05 接受日期:2022-10-18 出版日期:2022-11-11 发布日期:2022-11-21
  • 通讯作者: Lei Chen E-mail:chenlei1992@bupt.edu.cn

Detecting the possibility of a type of photon number splitting attack in decoy-state quantum key distribution

Xiao-Ming Chen(陈小明)1,2,3, Lei Chen(陈雷)1,2,†, and Ya-Long Yan(阎亚龙)3   

  1. 1 Beijing University of Posts and Telecommunications, Beijing 100876, China;
    2 Beijing Electronic Science and Technology Institute, Beijing 100070, China;
    3 University of Science and Technology of China, Hefei 230026, China
  • Received:2022-05-09 Revised:2022-09-05 Accepted:2022-10-18 Online:2022-11-11 Published:2022-11-21
  • Contact: Lei Chen E-mail:chenlei1992@bupt.edu.cn

摘要: The existing decoy-state quantum key distribution (QKD) beating photon-number-splitting (PNS) attack provides a more accurate method to estimate the secure key rate, while it still considers that only single-photon pulses can generate secure keys in any case. However, multiphoton pulses can also generate secure keys if we can detect the possibility of PNS attack in the channel. The ultimate goal of this line of research is to confirm the absence of all types of PNS attacks. In particular, the PNS attack mentioned and detected in this paper is only the weaker version of PNS attack which significantly changes the observed values of the legitimate users. In this paper, under the null hypothesis of no weaker version of PNS attack, we first determine whether there is an attack or not by retrieving the missing information of the existing decoy-state protocols, extract a Cauchy distribution statistic, and further provide a detection method and the type I error probability. If the result is judged to be an attack, we can use the existing decoy-state method and the GLLP formula to estimate the secure key rate. Otherwise, the pulses with the same basis received including both single-photon pulses and multiphoton pulses, can be used to generate the keys and we give the secure key rate in this case. Finally, the associated experiments we performed (i.e., the significance level is 5%) show the correctness of our method.

关键词: quantum key distribution, photon number splitting, decoy state, hypothesis testing

Abstract: The existing decoy-state quantum key distribution (QKD) beating photon-number-splitting (PNS) attack provides a more accurate method to estimate the secure key rate, while it still considers that only single-photon pulses can generate secure keys in any case. However, multiphoton pulses can also generate secure keys if we can detect the possibility of PNS attack in the channel. The ultimate goal of this line of research is to confirm the absence of all types of PNS attacks. In particular, the PNS attack mentioned and detected in this paper is only the weaker version of PNS attack which significantly changes the observed values of the legitimate users. In this paper, under the null hypothesis of no weaker version of PNS attack, we first determine whether there is an attack or not by retrieving the missing information of the existing decoy-state protocols, extract a Cauchy distribution statistic, and further provide a detection method and the type I error probability. If the result is judged to be an attack, we can use the existing decoy-state method and the GLLP formula to estimate the secure key rate. Otherwise, the pulses with the same basis received including both single-photon pulses and multiphoton pulses, can be used to generate the keys and we give the secure key rate in this case. Finally, the associated experiments we performed (i.e., the significance level is 5%) show the correctness of our method.

Key words: quantum key distribution, photon number splitting, decoy state, hypothesis testing

中图分类号:  (Quantum cryptography and communication security)

  • 03.67.Dd
03.67.Hk (Quantum communication)