† Corresponding author. E-mail:
Project supported by the National Key Research and Development Program of China (Grant No. 2016YFA0302600) and the National Natural Science Foundation of China (Grant No. 61675235).
The unconditional security of quantum key distribution (QKD) can be guaranteed by the nature of quantum physics. Compared with the traditional two-dimensional BB84 QKD protocol, high-dimensional quantum key distribution (HD-QKD) can be applied to generate much more secret key. Nonetheless, practical imperfections in realistic systems can be exploited by the third party to eavesdrop the secret key. The practical beam splitter has a correlation with wavelength, where different wavelengths have different coupling ratios. Using this property, we propose a wavelength-dependent attack towards time-bin high-dimensional QKD system. What is more, we demonstrate that this attacking protocol can be applied to arbitrary d-dimensional QKD system, and higher-dimensional QKD system is more vulnerable to this attacking strategy.
Quantum key distribution (QKD)[1,2] is a novel routine of sharing secret key between two distant parties (called Alice and Bob) in the presence of an eavesdropper Eve. The unconditional security of QKD protocol is guaranteed by the nature of quantum physics, which has been proved via different methods.[3–5] Some experimental demonstrations are also carried out and advances are achieved.[6–9] However, practical devices may be imperfect by comparing with the ideal protocol. For example, an imperfect phase modulator may be remote controlled by an eavesdropper Eve and introduce a phase remapping attack.[10,11] For practical single photon detectors (SPDs), detection efficiency mismatch between several SPDs would introduce time-shift attack[12] or faked state attack.[13–15] One single SPD may also be blinded by bright illumination and controlled by Eve.[16–20] Recently, the avalanche-transition region of SPD has also been utilized to hack the QKD system.[21] But not only that, the imperfections in real devices may open security loopholes and be utilized by Eve to get secret key information.
High-dimensional quantum key distribution (HD-QKD),[22–26] which is an expansion to common qubit-based QKD, is capable of encoding multiple bits on one single photon and has many advantages such as high photon information efficiency (PIE) and strong tolerance to channel noise. So HD-QKD has attracted much attention since its proposal. Ali-Khan et al.[27] put forward the first HD-QKD protocol based on time–energy entanglement but did not prove its security. Afterwards, Mower et al.[28] proved the security of time–energy entanglement-based HD-QKD against collective attack using dispersive optics. Zhang et al.[29] applied decoy-state method[30–32] to HD-QKD to defeat photon-number-splitting (PNS) attack[33,34] and proved its security against collective attacks. The security of decoy-state HD-QKD against collective attacks[35] and coherent attacks[36] in the finite-key scenario has also been established. However, the practical HD-QKD system may have imperfect devices, which can be utilized by the eavesdropper to get the final secret key.
In Ref. [37], the fiber beam splitter (BS) was discovered to possess a wavelength-dependent property. Making use of this property, Eve has the ability to control the outputs of the fiber beam splitter and then remotely control Bobʼs measurement basis choice. Utilizing this security loophole, a polarization-encoded BB84 QKD system was attacked successfully. Subsequently, Huang et al.[38,39] and Ma et al.[40] independently extended this so-called wavelength attack to practical continuous-variable QKD (CV-QKD) systems, regardless of whether Bob employs intensity monitoring. Afterwards, few investigations about wavelength attack have been constructed.
In this work, we apply wavelength attack towards HD-QKD system. We take four-dimensional time-bin HD-QKD system for example.[41] The eavesdropper Eve can control the measurement bases by just choosing two certain wavelengths, then she can apply the man-in-the-middle attack to get the final secret key. We calculate the final quantum bit error rate introduced by this attack and design a concrete implementation on a practical time-bin HD-QKD system. We also demonstrate that this attacking strategy is universally applicable towards any d-dimensional QKD system and higher-dimensional QKD system is more vulnerable to this attack.
The rest of this paper is organized as follows. In Section 2, we present a brief introduction on time-bin HD-QKD system and wavelength-dependent beam splitter. In Section 3, we demonstrate how to perform wavelength attack on time-bin HD-QKD system and calculate the quantum bit error rate caused by this attack. Some further discussion is put forward in Section 4 and conclusions are summarized in Section 5.
Without loss of generality, we take four-dimensional time-bin HD-QKD system for example.[41] The schematic diagram of time-bin HD-QKD system is depicted in Fig.
![]() | Fig. 1. Schematic daigram of four-dimensional time-bin HD-QKD system. (a) Representation of time-bin states (left) and phase states (right). (b) Experimental setup of time-bin HD-QKD system. 1550-nm LD means that Alice prepares signals with 1550-nm laser diode, ATT is the attenuator which is used to attenuate the light to single-photon level, BS is the beam splitter, DI1, DI2, and DI3 are delay-line interferometers which are used to direct different phase states to the corresponding detectors, ![]() |
For a general beam splitter (BS), it has one input port and two output ports. In the perfect situation, the incident single photon will pass through one output port randomly. This type of BS plays the role of a passive random basis selector in QKD systems. However, in a realistic setup, the fiber BS is manufactured by fused biconical taper (FBT) technology.[43] The coupling ratio (defined as
With regard to time-bin HD-QKD system mentioned above, the coupling ratio of BS is 0.90 for 1550 nm. In this protocol, the 90/10 beam splitter directs
Considering that wavelength attack has been carried out by Eve to time-bin HD-QKD system with the assumption that only the beam splitter is imperfect, the final quantum bit error rate (QBER) is given by
![]() | Fig. 3. The final QBER as a function of coupling ratios ![]() ![]() ![]() ![]() ![]() ![]() |
Utilizing the analysis above, a detailed schematic diagram of this attacking model is illustrated in Fig.
We consider wavelength attack towards arbitrary d-dimensional QKD system where the BS has an arbitrary coupling ratio r. In the d-dimensional QKD system, Alice prepares two sets of mutually unbiased bases
From Eq. (
Furthermore, we discuss the relationship between the dimension d and the coupling ratio
![]() | Fig. 6. Relationship between quantum bit error rate and coupling ratios. For dimensions d = 2, 4, 8, 16 [panels (a)–(d)], only data points (![]() ![]() |
As a further discussion, we study the requirement for coupling ratios under different dimensions. For simplicity, we just suppose that we can find two wavelengths which satisfy
To cover her presence, Eve should guarantee that the QBER value is lower than the maximal tolerable error rate. Therefore,
Last but not least, we would mention the resistance of QKD systems with different basis choice methods towards wavelength attack. We again take four-dimensional time-bin HD-QKD system mentioned above for example. This system adopts biased basis choice,[45] i.e., the preparation probabilities of two bases are unequal. Here biased ratio (defined as
In summary, we successfully carry out wavelength attack towards time-bin high-dimensional QKD system by utilizing the imperfection of fiber beam splitter. The eavesdropper Eve can obtain secret key information without increasing the quantum bit error rate. Our results also demonstrate that wavelength attack is a universal attacking strategy towards arbitrary d-dimensional QKD systems. Furthermore, we demonstrate that higher-dimensional QKD system is more vulnerable to wavelength attack. Meanwhile, we should also note that this type of attacking protocol can be avoided by applying actively modulated QKD systems. Measurement-device-independent QKD (MDI-QKD) is also immune to wavelength attack.
[1] | |
[2] | |
[3] | |
[4] | |
[5] | |
[6] | |
[7] | |
[8] | |
[9] | |
[10] | |
[11] | |
[12] | |
[13] | |
[14] | |
[15] | |
[16] | |
[17] | |
[18] | |
[19] | |
[20] | |
[21] | |
[22] | |
[23] | |
[24] | |
[25] | |
[26] | |
[27] | |
[28] | |
[29] | |
[30] | |
[31] | |
[32] | |
[33] | |
[34] | |
[35] | |
[36] | |
[37] | |
[38] | |
[39] | |
[40] | |
[41] | |
[42] | |
[43] | |
[44] | |
[45] | |
[46] |