
Monitoring of continuous-variable quantum key distribution system in real environment
Author(s) -
Weiqi Liu,
Jinye Peng,
Peng Huang,
Duan Huang,
Guihua Zeng
Publication year - 2017
Publication title -
optics express
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 1.394
H-Index - 271
ISSN - 1094-4087
DOI - 10.1364/oe.25.019429
Subject(s) - quantum key distribution , computer science , quantum cryptography , key (lock) , quantum channel , gaussian , computer security , continuous variable , variable (mathematics) , security analysis , signal (programming language) , quantum , telecommunications , physics , quantum information , quantum mechanics , mathematics , mathematical optimization , mathematical analysis , programming language
How to guarantee the practical security of continuous-variable quantum key distribution (CVQKD) system has been an important issue in the quantum cryptography applications. In contrast to the previous practical security strategies, which focus on the intercept-resend attack or the Gaussian attack, we investigate the practical security strategy based on a general attack, i.e., an arbitrated individual attack or collective attack on the system by Eve in this paper. The low bound of intensity disturbance of the local oscillator signal for eavesdropper successfully concealing herself is obtained, considering all noises can be used by Eve in the practical environment. Furthermore, we obtain an optimal monitoring condition for the practical CVQKD system so that legitimate communicators can monitor the general attack in real-time. As examples, practical security of two special systems, i.e., the Gaussian modulated coherent state CVQKD system and the middle-based CVQKD system, are investigated under the intercept-resend attacks.