pith. sign in

arxiv: 2605.03572 · v1 · submitted 2026-05-05 · 🪐 quant-ph

Experimental demonstration of a coherent detector blinding attack on a real CV-QKD system

Pith reviewed 2026-05-07 17:23 UTC · model grok-4.3

classification 🪐 quant-ph
keywords continuous-variable quantum key distributionCV-QKDdetector blinding attackcoherent attackexcess noiseeavesdropper attackquantum cryptography security
0
0 comments X

The pith

A coherent detector blinding attack can hide more than 2.5 SNU of excess noise from the receiver in a real CV-QKD system.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

This paper presents an experimental implementation of a coherent detector blinding attack on a working continuous-variable quantum key distribution system. The eavesdropper uses the attack to prevent the receiver from accurately estimating channel parameters, thereby concealing the extra noise introduced by their own interference. A sympathetic reader would care because it shows that device imperfections in CV-QKD can be exploited to compromise security in practice without triggering alerts. If the demonstration holds, current systems require new safeguards to maintain their claimed security level.

Core claim

The authors implement a coherent detector blinding attack in which the eavesdropper hinders the receiver's ability to properly estimate the channel parameters, thereby hiding the impact of their collective attack. Experimental results on a real CV-QKD system show that excess noise in excess of 2.5 SNU can be reliably hidden, demonstrating the feasibility of the attack. The work also discusses how the attack can be strengthened with more advanced modulation formats and proposes countermeasures.

What carries the argument

The coherent detector blinding attack, in which intense light saturates the detector to alter its response and mask the eavesdropper's effect on measured noise and correlations.

If this is right

  • Excess noise above 2.5 SNU can be concealed from standard channel estimation without raising alarms.
  • The attack strategy can be extended using more advanced modulation formats to achieve stronger interference.
  • Practical CV-QKD implementations need additional hardware or software checks to detect blinding.
  • Security proofs for CV-QKD must account for this class of detector manipulation in real devices.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • Comparable blinding methods could be tested on other detector technologies used in quantum communication.
  • Deployed networks might benefit from continuous monitoring of detector saturation levels as a basic safeguard.
  • The result suggests examining whether similar attacks exist against the transmitter side or against discrete-variable systems.

Load-bearing premise

The blinding attack can be carried out on a representative real-world CV-QKD system without introducing other detectable anomalies that would alert the legitimate users.

What would settle it

Running the attack on the same system and checking whether the receiver's parameter estimation still reports the added excess noise or flags statistical anomalies in the detection data.

Figures

Figures reproduced from arXiv: 2605.03572 by Daniel Pereira, Florian Prawits, Hannes H\"ubbel, Vana Pezelj.

Figure 1
Figure 1. Figure 1: Diagram of the general attack strategy being view at source ↗
Figure 2
Figure 2. Figure 2: Schematic diagram of the required path for view at source ↗
Figure 3
Figure 3. Figure 3: Diagram of the CV-QKD receiver being used as a target for the attack. ADC: Analog to Digital Converter; view at source ↗
Figure 4
Figure 4. Figure 4: Diagram of the DSP stage of the CV-QKD receiver. Accepted in Quantum 2017-05-09, click title to verify. Published under CC-BY 4.0. 5 view at source ↗
Figure 5
Figure 5. Figure 5: Diagram of the noise source used to simulate view at source ↗
Figure 7
Figure 7. Figure 7: Diagram of the blinding source stage of the attack. BS: 50/50 Beam Splitter; OPM: Optical Power Meter; PSU: Power Supply Unit; TEC: TEmpera￾ture Controller; WDM: Wavelength Division Multiplexer; VOA: Variable Optical Attenuator. Industries SLV5410 diode emitting at 1344 nm, being run by a Rigol DG1032 function genera￾tor, which was used to supply the current to the laser diode, and a Thorlabs TED200C tempe… view at source ↗
Figure 6
Figure 6. Figure 6: Demonstration of the reproducibility of the view at source ↗
Figure 9
Figure 9. Figure 9: Time domain and frequency domain represen view at source ↗
Figure 11
Figure 11. Figure 11: Diagram of experimental apparatus. In depth view at source ↗
Figure 10
Figure 10. Figure 10: Time domain and frequency domain represen view at source ↗
Figure 12
Figure 12. Figure 12: Impact of the blinding signal on the estimated view at source ↗
read the original abstract

Continuous-variable quantum key distribution provides a theoretical unconditionally secure solution to distribute symmetric keys among users in a communication network. However, the practical devices used to implement these systems are intrinsically imperfect, and, as a result, open the door to eavesdropper attacks. In this work, we present a novel implementation of a coherent detector blinding attack, in which the eavesdropper hinders the capability of the receiver to properly estimate the channel parameters, hiding the impact of their collective attack. Our results show that excess noise in excess of 2.5 SNU can be reliably hidden by the eavesdropper, thus demonstrating the feasibility of the attack. We also discuss how our attack strategy can be further improved to allow for even stronger attacks (by using more advanced modulation formats), and propose some countermeasures to prevent it.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 2 minor

Summary. The paper experimentally demonstrates a coherent detector blinding attack on a real continuous-variable quantum key distribution (CV-QKD) system. The authors implement an attack in which the eavesdropper blinds the receiver's detector to conceal the excess noise introduced by a collective attack, reporting that excess noise exceeding 2.5 shot noise units (SNU) can be hidden while the legitimate parties' channel parameter estimates remain unaffected.

Significance. If the results hold, this work provides direct experimental evidence of a practical implementation vulnerability in CV-QKD, showing that standard parameter estimation routines can be circumvented by coherent blinding. The demonstration on a representative real-world system, combined with discussion of stronger attack variants and proposed countermeasures, strengthens the case for re-examining security assumptions in deployed QKD hardware.

major comments (2)
  1. [Experimental results (parameter estimation subsection)] The central claim that >2.5 SNU of excess noise can be reliably hidden requires that the estimated transmittance T and excess noise ξ remain statistically indistinguishable between attacked and unattacked runs. The manuscript does not report the full (T, ξ) pairs with uncertainties for both cases, nor demonstrate that any deviations fall inside the 1-σ error bars given the number of samples acquired. This verification is load-bearing for the undetectability assertion.
  2. [Methods] The experimental methods section does not provide sufficient detail on the quadrature variance, covariance, and higher-order statistics measured during parameter estimation, nor on the controls used to confirm that the blinding introduces no other detectable anomalies outside the standard CV-QKD routine.
minor comments (2)
  1. [Abstract] The abstract states the attack is 'novel' without explicitly contrasting it against prior detector blinding or saturation attacks in the CV-QKD literature.
  2. [Figures] Figure captions and axis labels in the results figures would benefit from explicit indication of which traces correspond to attacked versus unattacked runs.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for their thorough review and valuable comments on our manuscript. We have carefully considered the major comments and will revise the paper accordingly to address the concerns raised. Below we provide point-by-point responses.

read point-by-point responses
  1. Referee: [Experimental results (parameter estimation subsection)] The central claim that >2.5 SNU of excess noise can be reliably hidden requires that the estimated transmittance T and excess noise ξ remain statistically indistinguishable between attacked and unattacked runs. The manuscript does not report the full (T, ξ) pairs with uncertainties for both cases, nor demonstrate that any deviations fall inside the 1-σ error bars given the number of samples acquired. This verification is load-bearing for the undetectability assertion.

    Authors: We appreciate this observation. Upon re-examination, we acknowledge that while the manuscript states the estimates remain unaffected, the detailed values with uncertainties were not explicitly tabulated. In the revised version, we will add a new table or subsection in the experimental results presenting the mean values and standard deviations for T and ξ in both attacked and unattacked scenarios. We will calculate and report the 1-σ error bars based on the acquired samples and demonstrate that the differences are statistically insignificant, thereby supporting the undetectability claim. revision: yes

  2. Referee: [Methods] The experimental methods section does not provide sufficient detail on the quadrature variance, covariance, and higher-order statistics measured during parameter estimation, nor on the controls used to confirm that the blinding introduces no other detectable anomalies outside the standard CV-QKD routine.

    Authors: We agree that expanding the methods description will improve clarity and reproducibility. In the revised manuscript, we will include additional details on the measured quadrature variances and covariances used in the parameter estimation procedure. We will also describe the higher-order statistics that were monitored and the specific control measurements performed to ensure that the blinding attack does not introduce detectable anomalies beyond the targeted effect on excess noise estimation. revision: yes

Circularity Check

0 steps flagged

No circularity: experimental demonstration without derivation chain

full rationale

This paper is a direct experimental report of a coherent detector blinding attack on a CV-QKD system. The central result (excess noise >2.5 SNU hidden while parameter estimates remain statistically compatible) is obtained from physical measurements of quadrature statistics in attacked and unattacked runs. No first-principles derivation, ansatz, uniqueness theorem, or fitted-parameter prediction is claimed or used; the feasibility conclusion follows immediately from the observed data without any reduction to self-referential inputs or self-citations. The analysis is therefore self-contained.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

The work is experimental and rests on standard domain assumptions of CV-QKD rather than new free parameters or invented entities.

axioms (1)
  • domain assumption Standard CV-QKD security models and device behavior assumptions hold for the tested system.
    The attack feasibility claim depends on the receiver operating according to typical CV-QKD models.

pith-pipeline@v0.9.0 · 5442 in / 1134 out tokens · 194516 ms · 2026-05-07T17:23:52.089121+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

25 extracted references · 20 canonical work pages

  1. [2]

    Theoretical study of continuous-variable quantum key distri- bution

    Anthony Leverrier. “Theoretical study of continuous-variable quantum key distri- bution”. PhD thesis. Télécom ParisTech, Nov. 20, 2009.url:https : / / pastel . hal . science / tel - 00451021(visited on 07/25/2024)

  2. [3]

    Continuous- Variable Quantum Key Distribution with Gaussian Modulation—The The- ory of Practical Implementations

    Fabian Laudenbach et al. “Continuous- Variable Quantum Key Distribution with Gaussian Modulation—The The- ory of Practical Implementations”. In: Advanced Quantum Technologies1.1 (2018), p. 1800011.issn: 2511-9044.doi: 10.1002/qute.201800011.url:https : //onlinelibrary.wiley.com/doi/abs/ 10 . 1002 / qute . 201800011(visited on 07/25/2024)

  3. [4]

    Homodyne-detector- blinding attack in continuous-variable quantum key distribution

    Hao Qin et al. “Homodyne-detector- blinding attack in continuous-variable quantum key distribution”. In:Physical Review A98.1 (July 12, 2018), p. 012312. doi: 10.1103/PhysRevA.98.012312.url:h ttps : / / link . aps . org / doi / 10 . 1103 / PhysRevA . 98 . 012312(visited on 09/29/2023)

  4. [6]

    Quantum cryptography: Public key dis- tribution and coin tossing

    Charles H. Bennett and Gilles Brassard. “Quantum cryptography: Public key dis- tribution and coin tossing”. In:Theoret- ical Computer Science. Theoretical As- pects of Quantum Cryptography – cele- brating 30 years of BB84 560 (Dec. 4, 2014), pp. 7–11.issn: 0304-3975.doi: 10.1016/j.tcs.2014.05.025.url:https : / / www . sciencedirect . com / science / arti ...

  5. [7]

    Continuous variable quan- tum cryptography

    T. C. Ralph. “Continuous variable quan- tum cryptography”. In:Physical Review A61.1 (Dec. 8, 1999), p. 010303.doi: 10.1103/PhysRevA.61.010303.url:https ://link.aps.org/doi/10.1103/PhysRev A.61.010303(visited on 01/11/2024)

  6. [8]

    Secret key rate of multi-ring M-APSK continuous variable quantum key distribution

    Margarida Almeida et al. “Secret key rate of multi-ring M-APSK continuous variable quantum key distribution”. In: Optics Express29.23 (Nov. 8, 2021), pp. 38669–38682.issn: 1094-4087.doi: 10.1364/OE.439992.url:https : / / opg . optica.org/oe/abstract.cfm?uri=oe- 29-23-38669(visited on 02/06/2024)

  7. [9]

    OUP Oxford, 2000

    Rodney Loudon.The quantum theory of light. OUP Oxford, 2000

  8. [10]

    Blais, A

    Valerio Scarani et al. “The security of prac- tical quantum key distribution”. In:Re- views of Modern Physics81.3 (Sept. 2009), pp. 1301–1350.doi: 10.1103/RevMod- Phys.81.1301.url:https : / / link . aps . org/doi/10.1103/RevModPhys.81.1301 (visited on 11/14/2025)

  9. [11]

    Quantum cryptography with coherent states

    B. Huttner et al. “Quantum cryptography with coherent states”. In:Physical Review A51.3 (Mar. 1, 1995), pp. 1863–1869.doi: 10.1103/PhysRevA.51.1863.url:https : //link.aps.org/doi/10.1103/PhysRe vA.51.1863(visited on 01/08/2024)

  10. [12]

    Quantum Key Dis- tribution with High Loss: Toward Global Secure Communication

    Won-Young Hwang. “Quantum Key Dis- tribution with High Loss: Toward Global Secure Communication”. In:Physical Re- view Letters91.5 (Aug. 1, 2003), p. 057901. doi:10.1103/PhysRevLett.91.057901.url: https : / / link . aps . org / doi / 10 . 1103/PhysRevLett.91.057901(visited on 02/14/2024). Accepted inQuantum 2017-05-09, click title to verify. Published und...

  11. [13]

    Decoy State Quantum Key Dis- tribution

    Hoi-Kwong Lo, Xiongfeng Ma, and Kai Chen. “Decoy State Quantum Key Dis- tribution”. In:Physical Review Letters 94.23 (June 16, 2005), p. 230504.doi: 10.1103/PhysRevLett.94.230504.url:htt ps : / / link . aps . org / doi / 10 . 110 3 / PhysRevLett . 94 . 230504(visited on 02/28/2024)

  12. [14]

    Fed- eral Office for Information Security

    BSI.AIS 46 Basics of Evaluating Side- Channel and Fault Attack Resistance. Fed- eral Office for Information Security. 2024. url:https : / / www . bsi . bund . de / EN / Themen/Unternehmen-und-Organisation en / Informationen - und - Empfehlungen / Kryptografie / Seitenkanalresistenz / seitenkanalresistenz.html?nn=916726 (visited on 04/30/2024)

  13. [16]

    Generating the Local Oscillator “Locally” in Continuous-Variable Quantum Key Distribution Based on Coherent Detection

    Bing Qi et al. “Generating the Local Os- cillator “Locally” in Continuous-Variable Quantum Key Distribution Based on Co- herent Detection”. In:Physical Review X 5.4 (Oct. 21, 2015), p. 041009.issn: 2160- 3308.doi: 10.1103/PhysRevX.5.041009. arXiv:1503.00662.url:https://link. aps . org / doi / 10 . 1103 / PhysRevX . 5 . 041009

  14. [17]

    Wavelength attack on practical continuous-variable quantum- key-distribution system with a hetero- dyne protocol

    Xiang-Chun Ma et al. “Wavelength attack on practical continuous-variable quantum- key-distribution system with a hetero- dyne protocol”. In:Physical Review A 87.5 (May 9, 2013), p. 052309.doi: 10.1103/PhysRevA.87.052309.url:https ://link.aps.org/doi/10.1103/PhysRev A.87.052309(visited on 05/01/2023)

  15. [18]

    Wang, Physical Review B94, 10.1103/phys- revb.94.195105 (2016)

    Jing-Zheng Huang et al. “Quantum hack- ing of a continuous-variable quantum-key- distribution system using a wavelength at- tack”. In:Physical Review A87.6 (June 24, 2013), p. 062329.doi: 10.1103/Phys- RevA.87.062329.url:https : / / link . aps . org / doi / 10 . 1103 / PhysRevA . 87 . 062329(visited on 05/01/2023)

  16. [19]

    Quantum hack- ing on quantum key distribution using ho- modyne detection

    Jing-Zheng Huang et al. “Quantum hack- ing on quantum key distribution using ho- modyne detection”. In:Physical Review A 89.3 (2014), p. 032304

  17. [20]

    Self-referenced continuous-variable quantum key distribu- tion protocol

    Daniel BS Soh et al. “Self-referenced continuous-variable quantum key distribu- tion protocol”. In:Physical Review X5.4 (2015), p. 041010

  18. [21]

    Impact of receiver imbalances on the security of continu- ous variables quantum key distribution

    Daniel Pereira et al. “Impact of receiver imbalances on the security of continu- ous variables quantum key distribution”. In:EPJ Quantum Technology8.1 (Dec. 2021), pp. 1–12.issn: 2196-0763.doi: 10.1140/epjqt/s40507-021-00112-z.url:h ttps : / / epjquantumtechnology . spri ngeropen . com / articles / 10 . 1140 / epjqt/s40507- 021- 00112- z(visited on 01/11/2024)

  19. [22]

    Saturation attack on continuous- variable quantum key distribution sys- tem

    Hao Qin, Rupesh Kumar, and Romain Al- léaume. “Saturation attack on continuous- variable quantum key distribution sys- tem”. In:Emerging Technologies in Se- curity and Defence; and Quantum Secu- rity II; and Unmanned Sensor Systems X. Emerging Technologies in Security and Defence; and Quantum Security II; and Unmanned Sensor Systems X. Vol. 8899. SPIE, Oc...

  20. [23]

    Explicit asymptotic se- cret key rate of continuous-variable quan- tum key distribution with an arbitrary modulation

    Aurélie Denys, Peter Brown, and An- thony Leverrier. “Explicit asymptotic se- cret key rate of continuous-variable quan- tum key distribution with an arbitrary modulation”. en-GB. In:Quantum5 (Sept. 2021), p. 540.doi: 10.22331/q-2021-09-13- 540.url:https : / / quantum - journal . org / papers / q - 2021 - 09 - 13 - 540/(vis- ited on 01/11/2024)

  21. [24]

    Schaeffer

    Sebastian Kleis, Max Rueckmann, and Christian G. Schaeffer. “Continuous vari- able quantum key distribution with a real Accepted inQuantum 2017-05-09, click title to verify. Published under CC-BY 4.0.12 local oscillator using simultaneous pilot sig- nals”. EN. In:Optics Letters42.8 (Apr. 2017), pp. 1588–1591.issn: 1539-4794.doi: 10.1364/OL.42.001588.url:h...

  22. [25]

    Balanced Photode- tection

    Dr Rüdiger Paschotta. “Balanced Photode- tection”. en. In:RP Photonics Encyclope- dia(May 2019).doi: 10.61835/3f2.url: https : / / www . rp - photonics . com / balanced_photodetection.html(visited on 03/27/2026)

  23. [26]

    Wave- length multiplexing in single-mode fiber couplers

    Michel Digonnet and H. J. Shaw. “Wave- length multiplexing in single-mode fiber couplers”. EN. In:Applied Optics22.3 (Feb. 1983), pp. 484–491.issn: 2155-3165. doi: 10.1364/AO.22.000484.url:https : / / opg . optica . org / ao / abstract . cfm ? uri = ao - 22 - 3 - 484(visited on 03/27/2026). [27]WL-BPD1GA - 1GHzDual-Balanced In- GaAs Low Noise Photodetecto...

  24. [27]

    Simple and Fast Po- larization Tracking Algorithm for Continuous-Variable Quantum Key Distribution System Using Orthogonal Pilot Tone

    Yan Pan et al. “Simple and Fast Po- larization Tracking Algorithm for Continuous-Variable Quantum Key Distribution System Using Orthogonal Pilot Tone”. In:Journal of Lightwave Technology41.19 (Oct. 2023). Conference Name: Journal of Lightwave Technol- ogy, pp. 6169–6175.issn: 1558-2213. doi: 10.1109/JLT.2023.3277982.url: https : / / ieeexplore . ieee . or...

  25. [28]

    Polarization Diverse True Heterodyne Receiver Architecture for Con- tinuous Variable Quantum Key Distribu- tion

    Daniel Pereira, Armando N. Pinto, and Nuno A. Silva. “Polarization Diverse True Heterodyne Receiver Architecture for Con- tinuous Variable Quantum Key Distribu- tion”. EN. In:Journal of Lightwave Tech- nology41.2 (Jan. 2023), pp. 432–439.doi: 10.1109/JLT.2022.3216754.url:https : / / opg . optica . org / jlt / abstract . cfm ? uri = jlt - 41 - 2 - 432(visi...