Unlock instant, AI-driven research and patent intelligence for your innovation.

A method to defend against device calibration attacks in quantum key distribution systems

A quantum key distribution and equipment technology, applied in key distribution, can solve problems such as inability to intuitively monitor equipment calibration attacks, unfavorable attack effects, and inability to use, so as to facilitate the demonstration of attack effects, ensure security, and avoid attack errors. Judgment effect

Active Publication Date: 2022-08-02
QUANTUMCTEK +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The above methods of defending against equipment calibration attacks are only applicable to phase-encoded QKD systems based on active vector selection schemes, especially relying on devices that can modulate signals randomly, such as phase modulators and their modulation circuits, while for other QKD systems, For example, in the QKD system based on the passive base vector selection scheme, the above defense method cannot be used, because Bob at the receiving end has no device that can apply a random phase to randomly replace the detection results of multiple detectors
[0013] Secondly, this scheme can make the detection efficiency consistent regardless of whether it has been attacked; but this scheme cannot intuitively monitor whether it has been attacked by device calibration, which is not conducive to the demonstration of the attack effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method to defend against device calibration attacks in quantum key distribution systems
  • A method to defend against device calibration attacks in quantum key distribution systems
  • A method to defend against device calibration attacks in quantum key distribution systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] 1) First complete the construction of the parameter calibration system, such as Figure 4 shown.

[0076] The components of the parameter calibration system include: a standard light source in the sender, a quantum channel and a detection system to be parameterized at the receiver. There is also a built-in calibration light source in the receiver, which is connected to the receiver detection system to be calibrated through the coupling of optical switches or BS and other coupling elements.

[0077] Parameter calibration needs to be done in a safe area. There are two specific situations and methods for the selection of the safe area.

[0078] ① One is that the sender, the receiver, and the quantum channel between them are placed in a safe area that cannot be touched by the attacker Eve. Then the process of parameter calibration of the detection system in this area is safe. This safe area can be guaranteed at the factory calibration, because it has not been deployed i...

example 1

[0172] like Figure 5 As shown, for example, for a certain QKD device, the HVPN delay positions are 100ps, 200ps, 300ps, and 400ps in the pre-delivery delay scan results, then the delay difference between HVPNs is:

[0173] V-H=100ps, P-H=200ps, N-H=300ps;

[0174] H-V=-100ps, P-V=100ps, N-V=200ps;

[0175] H-P=-200ps, V-P=-100ps, N-P=100ps;

[0176] H-N=-300ps, V-N=-200ps, P-N=-100ps;

[0177] Adding the commonly used floating value ±20ps obtained from data statistics, the credible range of the delay difference is:

[0178] V-H=[80ps, 120ps], P-H=[180ps, 220ps], N-H=[280ps, 320ps];

[0179] H-V=[-120ps,-80ps], P-V=[80ps,120ps], N-V=[180ps,220ps];

[0180] H-P=[-220ps,-180ps], V-P=[-120ps,-80ps], N-P=[80ps,120ps];

[0181] H-N=[-320ps,-280ps], V-N=[-220ps,-180ps], P-N=[-120ps,-80ps];

[0182] Store the range in this QKD device.

[0183] After the device is deployed from the factory and goes online, start up and run, and perform the delay scan device calibration process...

example 2

[0190] The same factory parameters as in Example 1, if the result of a delay scan is as follows Figure 7 shown, then:

[0191] V-H=120ps, P-H=230ps, N-H=330ps;

[0192] H-V=-120ps, P-V=110ps, N-V=210ps;

[0193] H-P=-230ps, V-P=-110ps, N-P=100ps;

[0194] H-N=-330ps, V-N=-210ps, P-N=-100ps;

[0195] Compare the delay difference result with the above factory-set credible delay difference range, and find that "P-H", "N-H", "H-P", and "H-N" are out of the credible range, then the device calibration process of the delay scan is abnormal. , judge that there is a device calibration attack and alarm, restart the delay scanning process, until the delay difference of each HVPN channel returns to the trusted range, determine that the device returns to the normal working state, and the device calibration attack stops.

[0196] The present invention is applicable to all QKD systems, suitable for active (such as phase modulator) or passive (such as beam splitter BS) quantum state deco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for resisting equipment calibration attacks in a quantum key distribution system, which comprises the following steps: 1) completing the construction of a parameter calibration system; 2) generating parameter calibration light in a safe area; 3) in a safe area , the receiver detection system to be calibrated completes the key parameter measurement; 4) The receiver detection system safety parameter calculation; 5) Set the safety threshold DeltaAllowRange; 6) In the field area, generate parameter calibration light; 7) In the field area, receive Only then completes the measurement and determination or calibration of key parameters of the detector. The advantages of the present invention are: the function of resisting equipment calibration attacks can be realized only by means of necessary equipment parameter calibration and system online detection, and by adding built-in calibration light sources and coupling elements in the receiver's internal safe area, considering specific different situations Calibration calibration can more comprehensively eliminate the influence of actual system instability.

Description

technical field [0001] The invention relates to a method for resisting device calibration attacks in the technical field of actual quantum key distribution, in particular to a method for resisting device calibration attacks in a quantum key distribution (QKD) system. Background technique [0002] The QKD quantum key distribution device for information-theoretic security based on single-photon quantum state, because the optical signal of the receiver is very weak, in order to reduce the noise interference and the post-pulse interference caused by the response delay of the semiconductor detector, a gated single-photon detector is usually used. When there is a gating signal, the response of the semiconductor detector is valid, and outside the gating signal, the response of the semiconductor detector is invalid. [0003] For example, as figure 1 As shown, taking the light-emitting pulse frequency of 100 MHz as an example, the gate signal at the detection end is also 100 MHz, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/00H04B10/70
CPCH04L9/0852H04L9/002H04B10/70
Inventor 唐世彪程节汤艳琳孙剑
Owner QUANTUMCTEK