Unlock instant, AI-driven research and patent intelligence for your innovation.

Detector control attack detection method and system

A detection method and detection system technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as difficulty in experiment implementation, low code rate, and differences in monitoring range

Active Publication Date: 2019-12-03
UNIV OF SCI & TECH OF CHINA
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Second, the measurement device has nothing to do with the protocol. Specifically, it requires two independent lasers to achieve two-photon interference. The experimental implementation is difficult and the code rate is lower than the traditional BB84 protocol.
Third, it is mainly for passive monitoring of the actual parameters of the detectors or measurement terminals. Due to the differences in the parameters of different detectors or measurement terminals, there are also differences in the monitoring range.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detector control attack detection method and system
  • Detector control attack detection method and system
  • Detector control attack detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0032] See figure 1 , figure 1 It is a flow chart of the detection method of the detector control attack provided by the first embodiment of the present invention, which is used to detect the detector control attack in the quantum key distribution system. The method is implemented based on a defense model (variable efficiency detector), including:

[0033] S101, the sending end sends the quantum state to the receiving end, each detector in the receiving end randomly selects different detection efficiencies to measure the quantum state, and records the measurement result.

[0034] Specifically, Alice at the sending end prepares a set of quantum states, and each time randomly selects any one of the two sets of mutual unbi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A detector control attack detection method is used for detecting detector control attacks in a quantum key distribution system and comprises the steps that a sending end sends quantum states to a receiving end, detectors in the receiving end randomly select different detection efficiencies to measure the quantum states, and measurement results are recorded; at least two counting rates and bit error rates detected by the detector are counted according to the measurement result; and whether the quantum key distribution system is controlled and attacked by the detector or not is judged accordingto the counting rate and the bit error rate of the detector and the normal quantum key distribution condition of the quantum key distribution system. According to the method and the system, whether the quantum key distribution system is controlled and attacked by the detector or not is detected, the method and the system do not depend on defense criteria of a specific detector implementation modeand a coding implementation scheme of the quantum key distribution system, and the method and the system are suitable for BB84 protocols of phase coding and polarization coding.

Description

technical field [0001] The invention relates to the field of quantum secure communication, in particular to a detection method and system for a detector control attack. Background technique [0002] The single-photon detector is an indispensable device in the quantum key distribution system. It is a complex device. The actual characteristics do not match the theoretical characteristics, which may bring security holes, so that the attacker Eve has Opportunity to exploit these vulnerabilities to attack, steal key information, probe control attack is the most serious type of attack. In order to implement the detector control attack, the attacker Eve randomly selects the measurement base to measure the quantum state sent from the sending end Alice, and then uses the attack of a specific optical power to trigger the resend of the optical pulse to the receiving end Bob. Due to the control effect of the attacking light, the final output at Bob's end is almost the same as that of E...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04B10/70
CPCH04B10/70H04L9/0819H04L9/0852H04L63/1416H04L63/1441
Inventor 钱泳君王双何德勇陈巍银振强周政郭光灿韩正甫
Owner UNIV OF SCI & TECH OF CHINA