pith. machine review for the scientific record. sign in

arxiv: 1411.7222 · v1 · submitted 2014-11-26 · 🪐 quant-ph

Recognition: unknown

Hacking energy-time entanglement-based systems with classical light

Authors on Pith no claims yet
classification 🪐 quant-ph
keywords energy-timesecuritydevice-independentinequalitystandardsystemsviolationattacker
0
0 comments X
read the original abstract

Photonic systems based on energy-time entanglement have been proposed to test local realism using the Bell inequality. A violation of this inequality normally also certifies security of device-independent quantum key distribution, so that an attacker cannot eavesdrop or control the system. Here, we show how this security test can be circumvented in energy-time entangled systems when using standard avalanche photodetectors, allowing an attacker to compromise the system without leaving a trace. With tailored pulses of classical light we reach Bell values up to 3.63 at 97.6% detector efficiency which is an extreme violation. This is the first demonstration of a violation-faking source that both gives tunable violation and high detector efficiency. The implications are severe: the standard Clauser-Horne-Shimony-Holt inequality cannot be used to show device-independent security for standard postselecting energy-time entanglement setups. We conclude with suggestions of improved tests and experimental setups that can re-establish device-independent security.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.