Abstract
Recently, Boyer et al. (Phys Rev Lett 99:140501, 2007) introduced a conceptually novel semi-quantum key distribution scheme (BKM07). Tan et al. (Phys Rev Lett 102:098901, 2009) showed that classical Bob is unable to detect Eve’s eavesdropping by giving a special implementation of BKM07 protocol. In the reply, Boyer et al. (Phys Rev Lett 102:098902, 2009) gave a solution against the eavesdropping, i.e., Bob may place a filter that allows only photons with approximately specific frequency to pass just at the expected time \({\sim }t\). However, their improvement contradicts the descriptions about “classical.” If the assumption of “classical” is not considered, we give a delay-photon Trojan-horse attack on BKM07 protocol and its improvement and further present a possible improvement.
References
Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of the 35th Annual Symposium on Foundation of Computer Science, Santa Fe, New Mexico, November 20–22, 1994, pp. 124–134. IEEE Computer Society Press (1994)
Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the 28th Annual ACM Symposium on Theory of Computing, pp. 212–221, New York (1996)
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computer, Systems and Signal Processing, pp. 175–179, Bangalore (1984)
Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991)
Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Phys. Rev. Lett. 99, 140501 (2007)
Tan, Y.-G., Lu, H., Cai, Q.-Y.: Comment on “Quantum Key Distribution with Classical Bob”. Phys. Rev. Lett. 102, 098901 (2009)
Boyer, M., Kenigsberg, D., Mor, T.: Boyer, Kenigsberg, and Mor reply. Phys. Rev. Lett. 102, 098902 (2009)
Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145–195 (2002)
Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320-1/6(2006)
Deng, F.G., Zhou, P., Li, X. H., et al.: Robustness of two-way quantum communication protocols against Trojan horse attack. arXiv:quant-ph/0508168
Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23–25 (2006)
Hoffmann, H., Bostroem, K., Felbinger, T.: Comment on “Secure direct communication with a quantum one-time pad”. Phys. Rev. A72, 016301 (2005)
Lin, S., Wen, Q.Y., Gao, F., Zhu, F.C.: Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks. Phys. Rev. A 79, 054303 (2009)
Zou, X., Qiu, D., Li, L., Wu, L., Li, L.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A79, 052312 (2009)
Boyer, M., Mor, T.: Comment on “Semiquantum-key distribution using less than four quantum states”. Phys. Rev. A 83, 046301 (2011)
Gheorghiu, V.: Generalized semiquantum secret-sharing schemes. Phys. Rev. A 85, 052309 (2012)
Li, Q., Chan, W.H., Long, D.-Y.: Semiquantum secret sharing using entangled states. Phys. Rev. A 82, 022303 (2010)
Li, L.Z., Qiu, D.W., Mateus, P.: Quantum secret sharing with classical Bobs. J. Phys. A: Math. Theor. 46, 045304 (2013)
Acknowledgments
We thank the anonymous reviewer for his/her constructive suggestions. This work is supported by the National Natural Science Foundation of China (Grant No. 61003290); Beijing Natural Science Foundation (Grant Nos. 4122008, 4122012); The Importation and Development of High-Caliber Talents Project of Beijing Municipal Institutions (No. CIT&TCD201304039); National Cipher Development Fund during the 12th Five-Year Plan Period (No. MMJJ201401006).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yang, YG., Sun, SJ. & Zhao, QQ. Trojan-horse attacks on quantum key distribution with classical Bob. Quantum Inf Process 14, 681–686 (2015). https://doi.org/10.1007/s11128-014-0872-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11128-014-0872-1