Skip to main content
Log in

Trojan-horse attacks on quantum key distribution with classical Bob

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Recently, Boyer et al. (Phys Rev Lett 99:140501, 2007) introduced a conceptually novel semi-quantum key distribution scheme (BKM07). Tan et al. (Phys Rev Lett 102:098901, 2009) showed that classical Bob is unable to detect Eve’s eavesdropping by giving a special implementation of BKM07 protocol. In the reply, Boyer et al. (Phys Rev Lett 102:098902, 2009) gave a solution against the eavesdropping, i.e., Bob may place a filter that allows only photons with approximately specific frequency to pass just at the expected time \({\sim }t\). However, their improvement contradicts the descriptions about “classical.” If the assumption of “classical” is not considered, we give a delay-photon Trojan-horse attack on BKM07 protocol and its improvement and further present a possible improvement.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of the 35th Annual Symposium on Foundation of Computer Science, Santa Fe, New Mexico, November 20–22, 1994, pp. 124–134. IEEE Computer Society Press (1994)

  2. Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the 28th Annual ACM Symposium on Theory of Computing, pp. 212–221, New York (1996)

  3. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computer, Systems and Signal Processing, pp. 175–179, Bangalore (1984)

  4. Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991)

    Article  ADS  MATH  MathSciNet  Google Scholar 

  5. Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Phys. Rev. Lett. 99, 140501 (2007)

    Article  ADS  MathSciNet  Google Scholar 

  6. Tan, Y.-G., Lu, H., Cai, Q.-Y.: Comment on “Quantum Key Distribution with Classical Bob”. Phys. Rev. Lett. 102, 098901 (2009)

    Article  ADS  MathSciNet  Google Scholar 

  7. Boyer, M., Kenigsberg, D., Mor, T.: Boyer, Kenigsberg, and Mor reply. Phys. Rev. Lett. 102, 098902 (2009)

    Article  ADS  MathSciNet  Google Scholar 

  8. Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145–195 (2002)

    Article  ADS  Google Scholar 

  9. Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320-1/6(2006)

  10. Deng, F.G., Zhou, P., Li, X. H., et al.: Robustness of two-way quantum communication protocols against Trojan horse attack. arXiv:quant-ph/0508168

  11. Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23–25 (2006)

    Article  ADS  MATH  Google Scholar 

  12. Hoffmann, H., Bostroem, K., Felbinger, T.: Comment on “Secure direct communication with a quantum one-time pad”. Phys. Rev. A72, 016301 (2005)

    Article  ADS  Google Scholar 

  13. Lin, S., Wen, Q.Y., Gao, F., Zhu, F.C.: Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks. Phys. Rev. A 79, 054303 (2009)

    Article  ADS  Google Scholar 

  14. Zou, X., Qiu, D., Li, L., Wu, L., Li, L.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A79, 052312 (2009)

    Article  ADS  Google Scholar 

  15. Boyer, M., Mor, T.: Comment on “Semiquantum-key distribution using less than four quantum states”. Phys. Rev. A 83, 046301 (2011)

    Article  ADS  Google Scholar 

  16. Gheorghiu, V.: Generalized semiquantum secret-sharing schemes. Phys. Rev. A 85, 052309 (2012)

    Article  ADS  Google Scholar 

  17. Li, Q., Chan, W.H., Long, D.-Y.: Semiquantum secret sharing using entangled states. Phys. Rev. A 82, 022303 (2010)

    Article  ADS  Google Scholar 

  18. Li, L.Z., Qiu, D.W., Mateus, P.: Quantum secret sharing with classical Bobs. J. Phys. A: Math. Theor. 46, 045304 (2013)

    Article  ADS  MathSciNet  Google Scholar 

Download references

Acknowledgments

We thank the anonymous reviewer for his/her constructive suggestions. This work is supported by the National Natural Science Foundation of China (Grant No. 61003290); Beijing Natural Science Foundation (Grant Nos. 4122008, 4122012); The Importation and Development of High-Caliber Talents Project of Beijing Municipal Institutions (No. CIT&TCD201304039); National Cipher Development Fund during the 12th Five-Year Plan Period (No. MMJJ201401006).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Guang Yang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, YG., Sun, SJ. & Zhao, QQ. Trojan-horse attacks on quantum key distribution with classical Bob. Quantum Inf Process 14, 681–686 (2015). https://doi.org/10.1007/s11128-014-0872-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-014-0872-1

Keywords

Navigation