Security analysis against the Trojan horse attack on practical polarization-encoding quantum key distribution systems

Tingting Luo, Qiang Liu, Xiaoran Sun, Chunfeng Huang, Ye Chen, Zhenrong Zhang, and Kejin Wei
Phys. Rev. A 109, 042608 – Published 3 April 2024

Abstract

Quantum key distribution (QKD), which theoretically provides unconditional secure communication, has developed rapidly in the past decades. However, the practical QKD systems still have vulnerabilities due to device imperfections. Polarization-encoding systems are one of the most important branches in the field of QKD. To date, a variety of polarization-encoding schemes have been proposed to meet the requirements of high speed and robust modulation, but the security analysis of these schemes is often ignored. In this paper, we experimentally and theoretically evaluated the security of three typical polarization encoders against the Trojan horse attack (THA), which is recognized as one of the critical quantum attacks. We built a system to implement the THA and collected the reflection from QKD configuration with different encoders. According to the experimental results, we further analyzed the secure key rate and the resistance against THAs of the system while BB84 or measurement-device-independent QKD was applied. Our paper plays an important guiding role in the design of polarization encoders and the construction of secure QKD systems with realistic devices.

  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Received 6 July 2023
  • Revised 22 December 2023
  • Accepted 8 March 2024

DOI:https://doi.org/10.1103/PhysRevA.109.042608

©2024 American Physical Society

Physics Subject Headings (PhySH)

Quantum Information, Science & Technology

Authors & Affiliations

Tingting Luo1, Qiang Liu2,*, Xiaoran Sun1, Chunfeng Huang1, Ye Chen1, Zhenrong Zhang2,†, and Kejin Wei1,‡

  • 1Guangxi Key Laboratory for Relativistic Astrophysics, School of Physical Science and Technology, Guangxi University, Nanning 530004, China
  • 2Guangxi Key Laboratory of Multimedia Communications and Network Technology, School of Computer, Electronics and Information, Guangxi University, Nanning 530004, China

  • *q.liu@gxu.edu.cn
  • zzr76@gxu.edu.cn
  • kjwei@gxu.edu.cn

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 109, Iss. 4 — April 2024

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review A

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×