Security analysis of orthogonal state attack on a high-speed quantum key distribution system
Pith reviewed 2026-05-19 11:51 UTC · model grok-4.3
The pith
An eavesdropper can mute the detectors in a gigahertz-rate QKD system by sending hundreds of photons and thereby obtain nearly all the secret key.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The paper claims that a muted attack, implemented by illuminating the receiver’s SPADs with hundreds of photons per pulse, reliably suppresses detector response and lets Eve control the overall detection pattern, thereby extracting nearly all the secret bits without any intercept-resend step. The feasibility of the attack is shown experimentally at 1 GHz; the same security model is then used to compute the overestimated key rates that result when the system is subjected to either the muted attack or a dead-time attack.
What carries the argument
The muted attack, in which Eve sends a burst of hundreds of photons to suppress the avalanche response of Bob’s SPADs and thereby dictate the receiver’s detection statistics.
If this is right
- The secret key rate extracted from a high-speed QKD system is substantially overestimated when orthogonal-state attacks are not included in the security analysis.
- Eve can obtain nearly the entire key by controlling detector response rather than by measuring and resending photons.
- The attack remains effective at repetition rates of 1 GHz because the multi-photon mute occurs inside the short coincidence window.
- Both the muted attack and the related dead-time attack produce similar overestimates of the achievable key rate.
Where Pith is reading between the lines
- Detector designs for future gigahertz QKD links will need explicit protection against sustained multi-photon illumination.
- The same control mechanism could be tested on other single-photon detectors such as superconducting nanowire devices to check generality.
- Security proofs for high-speed QKD must now incorporate the possibility that detection efficiency can be externally modulated on a pulse-by-pulse basis.
Load-bearing premise
Multi-photon illumination can mute or steer the SPAD response inside the brief detection windows of a 1 GHz system without activating any existing security countermeasures.
What would settle it
An experiment in which hundreds of photons are sent to a 1 GHz SPAD during the system’s active time window and the detector efficiency remains unchanged or the output statistics stay random would falsify the attack’s effectiveness.
Figures
read the original abstract
High-speed quantum key distribution (QKD) systems have achieved repetition frequencies above gigahertz through advanced technologies and devices, laying an important foundation for the deployment of high-key-rate QKD system. Although these advanced systems may introduce potential loopholes, an eavesdropper Eve is challenging to exploit them by performing the intercept-resend attacks due to the limited time window under high repetition frequency. However, here, we propose a security analysis model of orthogonal state attacks that do not require intercept-resend operation on the key rate of a QKD system. Under this framework, we propose a muted attack and experimentally verify the feasibility of the attack using a 1 GHz single-photon avalanche detector (SPAD). By sending hundreds of photons each time, Eve can mute Bob's SPADs to control the overall detection response of the QKD receiver, allowing her to learn nearly all the keys. Furthermore, we use this security model to simulate the overestimated key rates of the QKD system under orthogonal state attacks, including both the muted attack and the dead-time attack. This work theoretically and experimentally shows a timely case of the security vulnerability in the high-speed QKD system.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript proposes a security analysis model for orthogonal state attacks on high-speed QKD systems that avoids intercept-resend operations. It introduces a muted attack in which Eve sends hundreds of photons per time slot to mute Bob's SPADs and thereby control the detection response, experimentally verifies the attack feasibility with a standalone 1 GHz SPAD, and simulates the resulting overestimation of secret key rates under both the muted attack and a dead-time attack.
Significance. If the experimental demonstration of controllable SPAD muting translates to a full synchronized dual-basis receiver without activating monitoring, the work identifies a concrete vulnerability in gigahertz-rate QKD implementations and supplies a quantitative security model that can be used to bound key-rate overestimation. The combination of a new attack framework, direct SPAD measurements, and rate simulations is a positive contribution to practical QKD security analysis.
major comments (3)
- [Experimental verification section] Experimental verification section: the manuscript reports that sending hundreds of photons mutes the 1 GHz SPAD and controls the overall detection response, yet provides no statistics on the achieved bias, no error bars, no raw count data, and no description of how the 1 ns detection window is synchronized with the QKD clock; these omissions are load-bearing for the central claim that the muted attack succeeds in a real system.
- [Security model and simulation section] Security model and simulation section: the assumption that the detection bias produced by the muted attack survives sifting, error correction, and privacy amplification without triggering photon-flux or dead-time monitoring is stated but not supported by any quantitative analysis of count-rate anomalies or existing countermeasures; this is required to establish that the attack yields nearly all keys.
- [Simulation results] Simulation results: the reported overestimation of key rates under the muted attack depends on specific bias parameters extracted from the SPAD experiment, but the manuscript does not show how these parameters enter the key-rate formula or provide sensitivity analysis, preventing independent verification of the quantitative claims.
minor comments (2)
- [Introduction] The introduction of the term 'orthogonal state attack' would benefit from an explicit comparison to existing detector-side attacks (e.g., blinding or dead-time attacks) and a clear statement of what is new versus what is a variant.
- [Figures] Figure captions for the SPAD response curves should include the exact photon number per pulse, repetition rate, and measurement duration to allow reproducibility.
Simulated Author's Rebuttal
We thank the referee for the constructive and detailed comments on our manuscript. We have carefully reviewed each major point and provide point-by-point responses below. Where the comments identify omissions that affect clarity or verifiability, we agree to incorporate the requested material in the revised version.
read point-by-point responses
-
Referee: [Experimental verification section] Experimental verification section: the manuscript reports that sending hundreds of photons mutes the 1 GHz SPAD and controls the overall detection response, yet provides no statistics on the achieved bias, no error bars, no raw count data, and no description of how the 1 ns detection window is synchronized with the QKD clock; these omissions are load-bearing for the central claim that the muted attack succeeds in a real system.
Authors: We agree that the experimental section would be strengthened by these details. In the revised manuscript we will add the measured bias statistics (mean detection control probability and standard deviation over repeated trials), include error bars on the relevant plots, supply raw count data as supplementary material, and describe the synchronization of the 1 ns window to the QKD clock via a shared reference signal. These additions will make the experimental demonstration of SPAD muting more transparent while preserving the central feasibility result. revision: yes
-
Referee: [Security model and simulation section] Security model and simulation section: the assumption that the detection bias produced by the muted attack survives sifting, error correction, and privacy amplification without triggering photon-flux or dead-time monitoring is stated but not supported by any quantitative analysis of count-rate anomalies or existing countermeasures; this is required to establish that the attack yields nearly all keys.
Authors: We acknowledge that a quantitative discussion of monitoring thresholds is needed. The revised manuscript will include an explicit comparison of the count-rate behavior under the muted attack against typical photon-flux and dead-time monitoring thresholds used in gigahertz QKD systems. We will also note the parameter regimes in which the bias can persist through sifting and post-processing without activating standard countermeasures, thereby supporting the claim that the attack can yield a large fraction of the key. revision: yes
-
Referee: [Simulation results] Simulation results: the reported overestimation of key rates under the muted attack depends on specific bias parameters extracted from the SPAD experiment, but the manuscript does not show how these parameters enter the key-rate formula or provide sensitivity analysis, preventing independent verification of the quantitative claims.
Authors: We agree that explicit substitution and sensitivity analysis will improve verifiability. In the revision we will present the secret-key-rate expression with the experimental bias parameters inserted, and we will add a sensitivity plot showing how the overestimation varies when the bias is changed within the experimentally observed range. This will allow readers to reproduce and assess the quantitative results. revision: yes
Circularity Check
No circularity: security model and muted attack rest on experimental verification of SPAD behavior
full rationale
The paper constructs a security analysis model for orthogonal state attacks on high-speed QKD systems and proposes the muted attack within that framework. Central claims are supported by direct experimental demonstration using a 1 GHz SPAD, where multi-photon illumination is shown to mute detectors and bias detection response. No load-bearing derivation reduces to fitted parameters, self-referential equations, or self-citation chains; the simulation of overestimated key rates follows from applying the proposed attack model to standard QKD rate formulas without circular reduction. The analysis is self-contained against external benchmarks via the reported experiment, yielding no significant circularity.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Single-photon avalanche diodes exhibit controllable muted response under illumination by hundreds of photons within high-repetition-rate time windows
invented entities (2)
-
muted attack
no independent evidence
-
orthogonal state attack model
no independent evidence
Reference graph
Works this paper leans on
-
[1]
H. Zbinden, N. Gisin, G. Ribordy, D. Stucki, and W. Tit- tel, Experimental quantum communication, in Exper- imental Quantum Computation and Information (IOS Press, 2002) pp. 217–232
work page 2002
-
[2]
V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Duˇ sek, N. L¨ utkenhaus, and M. Peev, The security of practical quantum key distribution, Rev. Mod. Phys. 81, 1301 (2009)
work page 2009
-
[3]
H.-K. Lo, M. Curty, and K. Tamaki, Secure quantum key distribution, Nat. Photonics 8, 595 (2014)
work page 2014
-
[4]
C. H. Bennett and G. Brassard, Quantum cryptography: Public key distribution and coin tossing, Theor. Comput. Sci 560, 7 (2014)
work page 2014
-
[5]
A. K. Ekert, Quantum cryptography based on bell’s the- orem, Phys. Rev. Lett. 67, 661 (1991)
work page 1991
-
[6]
Y.-A. Chen, Q. Zhang, T.-Y. Chen, W.-Q. Cai, S.-K. Liao, J. Zhang, K. Chen, J. Yin, J.-G. Ren, Z. Chen, S.-L. Han, Q. Yu, K. Liang, F. Zhou, X. Yuan, M.-S. Zhao, T.-Y. Wang, X. Jiang, L. Zhang, W.-Y. Liu, Y. Li, Q. Shen, Y. Cao, C.-Y. Lu, R. Shu, J.-Y. Wang, L. Li, N.- L. Liu, F. Xu, X.-B. Wang, C.-Z. Peng, and J.-W. Pan, An integrated space-to-ground qua...
work page 2021
-
[7]
E. Diamanti, H.-K. Lo, B. Qi, and Z. Yuan, Practical challenges in quantum key distribution, npj Quantum Inf 2, 16025 (2016)
work page 2016
-
[8]
M. Sasaki, Quantum networks: where should we be head- ing?, Quantum Science and Technology2, 020501 (2017)
work page 2017
-
[9]
Z. Yuan, A. Plews, R. Takahashi, K. Doi, W. Tam, A. Sharpe, A. Dixon, E. Lavelle, J. Dynes, A. Murakami, M. Kujiraoka, M. Lucamarini, Y. Tanizawa, H. Sato, and A. J. Shields, 10-mb/s quantum key distribution, J. Lightwave Technol. 36, 3427 (2018)
work page 2018
-
[10]
N. T. Islam, C. C. W. Lim, C. Cahall, J. Kim, and D. J. Gauthier, Provably secure and high-rate quantum key distribution with time-bin qudits, Sci. Adv 3, e1701491 (2017)
work page 2017
- [11]
-
[12]
W. Li, L. Zhang, H. Tan, Y. Lu, S.-K. Liao, J. Huang, H. Li, Z. Wang, H.-K. Mao, B. Yan, Q. Li, Y. Liu, Q. Zhang, C.-Z. Peng, L. You, F. Xu, and J.-W. Pan, High-rate quantum key distribution exceeding 110 mb s– 1, Nat. Photonics 17, 416 (2023)
work page 2023
-
[13]
Y. Du, X. Zhu, X. Hua, Z. Zhao, X. Hu, Y. Qian, X. Xiao, and K. Wei, Silicon-based decoder for polarization- encoding quantum key distribution, in Chip 2, 100039 (2023)
work page 2023
-
[14]
F. Gr¨ unenfelder, A. Boaron, G. V. Resta, M. Perrenoud, D. Rusca, C. Barreiro, R. Houlmann, R. Sax, L. Stasi, S. El-Khoury, E. H¨ anggi, N. Bosshard, F. Bussi` eres, and H. Zbinden, Fast single-photon detectors and real-time key distillation enable high secret-key-rate quantum key distribution systems, in Nat. Photonics 17, 422 (2023)
work page 2023
-
[15]
A. R. Dixon, Z. L. Yuan, J. F. Dynes, A. W. Sharpe, and A. J. Shields, Gigahertz decoy quantum key distribution with 1 mbit/s secure key rate, Opt. Express 16, 18790 (2008)
work page 2008
- [16]
-
[17]
S. Wang, W. Chen, Z.-Q. Yin, D.-Y. He, C. Hui, P.-L. Hao, G.-J. Fan-Yuan, C. Wang, L.-J. Zhang, J. Kuang, S.-F. Liu, Z. Zhou, Y.-G. Wang, G.-C. Guo, and Z.-F. Han, Practical gigahertz quantum key distribution robust against channel disturbance, Opt. Lett. 43, 2030 (2018)
work page 2030
-
[18]
X.-B. An, H. Zhang, C.-M. Zhang, W. Chen, S. Wang, Z.-Q. Yin, Q. Wang, D.-Y. He, P.-L. Hao, S.-F. Liu, X.- Y. Zhou, G.-C. Guo, and Z.-F. Han, Practical quantum digital signature with a gigahertz bb84 quantum key dis- tribution system, Opt. Lett. 44, 139 (2019)
work page 2019
-
[19]
N. Namekata, S. Sasamori, and S. Inoue, 800 mhz single-photon detection at 1550-nm using an ingaas/inp avalanche photodiode operated with a sine wave gating, Opt. Express 14, 10043 (2006)
work page 2006
-
[20]
N. Walenta, T. Lunghi, O. Guinnard, R. Houlmann, H. Zbinden, and N. Gisin, Sine gating detector with sim- ple filtering for low-noise infra-red single photon detec- 6 tion at room temperature, J. Appl. Phys. 112, 063106 (2012)
work page 2012
-
[21]
Z. L. Yuan, B. E. Kardynal, A. W. Sharpe, and A. J. Shields, High speed single photon detection in the near infrared, Appl. Phys. Lett. 91, 041114 (2007)
work page 2007
-
[22]
A. Restelli, J. C. Bienfang, and A. L. Migdall, Single- photon detection efficiency up to 50% at 1310-nm with an InGaAs/InP avalanche diode gated at 1.25-GHz, Appl. Phys. Lett. 102, 141104 (2013)
work page 2013
-
[23]
D.-Y. He, S. Wang, W. Chen, Z.-Q. Yin, Y.-J. Qian, Z. Zhou, G.-C. Guo, and Z.-F. Han, Sine-wave gating InGaAs/InP single photon detector with ultralow after- pulse, Appl. Phys. Lett. 110, 111104 (2017)
work page 2017
-
[24]
D.-Y. He, S. Wang, J.-L. Chen, W. Chen, Z.-Q. Yin, G.- J. Fan-Yuan, Z. Zhou, G.-C. Guo, and Z.-F. Han, 2.5 ghz gated ingaas/inp single-photon avalanche diode with 44 ps time jitter, Adv. devices instrum 4, 0020 (2023)
work page 2023
-
[25]
L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, Hacking commercial quantum cryptography systems by tailored bright illumination, in Nat. Photonics 4, 686 (2010)
work page 2010
-
[26]
Y. Zhao, C.-H. F. Fung, B. Qi, C. Chen, and H.-K. Lo, Quantum hacking: Experimental demonstration of time- shift attack against practical quantum-key-distribution systems, in Phys. Rev. A 78 (2008)
work page 2008
- [27]
-
[28]
L. Lydersen, N. Jain, C. Wittmann, O. Marøy, J. Skaar, C. Marquardt, V. Makarov, and G. Leuchs, Superlinear threshold detectors in quantum cryptography, Phys. Rev. A 84, 032320 (2011)
work page 2011
-
[29]
Y.-J. Qian, D.-Y. He, S. Wang, W. Chen, Z.-Q. Yin, G.- C. Guo, and Z.-F. Han, Robust countermeasure against detector control attack in a practical quantum key dis- tribution system, in Optica 6, 1178 (2019)
work page 2019
- [30]
-
[31]
Z. Wu, A. Huang, H. Chen, S.-H. Sun, J. Ding, X. Qiang, X. Fu, P. Xu, and J. Wu, Hacking single- photon avalanche detectors in quantum key distribution via pulse illumination, in Opt. Express 28, 25574 (2020)
work page 2020
-
[32]
B. Gao, Z. Wu, W. Shi, Y. Liu, D. Wang, C. Yu, A. Huang, and J. Wu, Ability of strong-pulse illumina- tion to hack self-differencing avalanche photodiode detec- tors in a high-speed quantum-key-distribution system, in Phys. Rev. A 106, 033713 (2022)
work page 2022
-
[33]
Wang, Beating the photon-number-splitting attack in practical quantum cryptography, Phys
X.-B. Wang, Beating the photon-number-splitting attack in practical quantum cryptography, Phys. Rev. Lett. 94, 230503 (2005)
work page 2005
-
[34]
H.-K. Lo, X. Ma, and K. Chen, Decoy state quantum key distribution, Phys. Rev. Lett. 94, 230504 (2005)
work page 2005
-
[35]
X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, Practical decoy state for quantum key distribution, Phys. Rev. A 72, 012326 (2005)
work page 2005
-
[36]
X.-B. Wang, C.-Z. Peng, J. Zhang, L. Yang, and J.-W. Pan, General theory of decoy-state quantum cryptogra- phy with source errors, Phys. Rev. A 77, 042311 (2008)
work page 2008
-
[37]
D. Gottesman, H.-K. Lo, N. Lutkenhaus, and J. Preskill, Security of quantum key distribution with imperfect de- vices, in International Symposium onInformation The- ory, 2004. ISIT 2004. Proceedings. (2004) pp. 136–
work page 2004
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.