pith. sign in

arxiv: 0704.3253 · v3 · pith:QYE5DTU5new · submitted 2007-04-24 · 🪐 quant-ph

Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems

classification 🪐 quant-ph
keywords attackquantumdetectiondistributionefficiencyexperimentalloopholesystem
0
0 comments X p. Extension
pith:QYE5DTU5 Add to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{QYE5DTU5}

Prints a linked pith:QYE5DTU5 badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

read the original abstract

Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (~4%) to break the security of the system. Eve's success is due to the well-known detection efficiency loophole in the experimental testing of Bell inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.