A detection method and system for a detector control attack

A detection method and detection system technology, which are applied in transmission systems, digital transmission systems, security communication devices, etc., can solve problems such as low code rate, difference in monitoring range, and difficulty in experiment implementation.

Active Publication Date: 2021-10-01
UNIV OF SCI & TECH OF CHINA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Second, the measurement device has nothing to do with the protocol. Specifically, it requires two independent lasers to achieve two-photon interference. The experimental implementation is difficult and the code rate is lower than the traditional BB84 protocol.
Third, it is mainly for passive monitoring of the actual parameters of the detectors or measurement terminals. Due to the differences in the parameters of different detectors or measurement terminals, there are also differences in the monitoring range.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A detection method and system for a detector control attack
  • A detection method and system for a detector control attack
  • A detection method and system for a detector control attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0032] See figure 1 , figure 1 It is a flow chart of the detection method of the detector control attack provided by the first embodiment of the present invention, which is used to detect the detector control attack in the quantum key distribution system. The method is implemented based on a defense model (variable efficiency detector), including:

[0033] S101, the sending end sends the quantum state to the receiving end, each detector in the receiving end randomly selects different detection efficiencies to measure the quantum state, and records the measurement result.

[0034] Specifically, Alice at the sending end prepares a set of quantum states, and each time randomly selects any one of the two sets of mutual unbi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A detection method for a detector control attack, which is used to detect a detector control attack in a quantum key distribution system, comprising: a sending end sends a quantum state to a receiving end, each detector in the receiving end randomly selects different detection The quantum state is measured, and the measurement results are recorded; according to the measurement results, the count rate and bit error rate detected by the detector are counted, wherein the number of count rate and bit error rate obtained by statistics is at least two; according to the count of the detector Rate and bit error rate and the conditions of normal quantum key distribution of the quantum key distribution system to judge whether the quantum key distribution system is attacked by the detector control. The method and system realize the detection of whether the quantum key distribution system is attacked by the detector control, and do not depend on the defense criterion of the specific detector implementation mode, and do not depend on the coding implementation scheme of the quantum key distribution system. For phase coding and Polarization-encoded BB84-like protocols are applicable.

Description

technical field [0001] The invention relates to the field of quantum secure communication, in particular to a detection method and system for a detector control attack. Background technique [0002] The single-photon detector is an indispensable device in the quantum key distribution system. It is a complex device. The actual characteristics do not match the theoretical characteristics, which may bring security holes, so that the attacker Eve has Opportunity to exploit these vulnerabilities to attack, steal key information, probe control attack is the most serious type of attack. In order to implement the detector control attack, the attacker Eve randomly selects the measurement base to measure the quantum state sent from the sending end Alice, and then uses the attack of a specific optical power to trigger the resend of the optical pulse to the receiving end Bob. Due to the control effect of the attacking light, the final output at Bob's end is almost the same as that of E...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06H04B10/70
CPCH04B10/70H04L9/0819H04L9/0852H04L63/1416H04L63/1441
Inventor 钱泳君王双何德勇陈巍银振强周政郭光灿韩正甫
Owner UNIV OF SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products