APREPRINT - OCTOBER 5, 2022
Compared to the source-side attacks, imperfections on the detection side are known to show much higher vulnerability
to quantum hacking [
20
]. For example, detector imperfections such as breakdown fluorescence [
21
], finite (
∼µ
s)
dead time [
22
], nonzero dark counts, less-than-unity efficiency, and nonfixed efficiency within the gate time [
23
], all
of which can be exploited by Eve to compromise QKD security. This leads in practice to a significant number of
potential attacks such as detector fluorescence [
24
], faked-state [
25
,
26
], time-shift [
27
,
23
], time-side-channel [
28
],
channel calibration [
29
], laser damage [
30
,
31
], spatial mismatch [
33
,
32
], detector saturation [
34
], and polarization
shift [
35
] attacks. More interestingly, the single-photon detectors (SPDs) of the receiver (Bob), normally operating in the
Geiger mode [
36
], can be turned by Eve into linear mode, which allows for various blinding and remote-control attacks
[
37
,
38
,
39
,
40
,
41
,
42
,
43
,
44
]. Among the detection-side attacks, the latter is widely known to be the most powerful
[
20
], with successful demonstrations on various types of SPDs, including passively and actively quenched avalanche
photodetectors (APDs) [
37
,
45
], gated/non-gated APDs [
46
,
38
], and superconducting nanowire single-photon detectors
(SNSPDs) [47].
Since the inception of quantum encryption [
1
], the intercept-resend strategies have been developed through many
quantum hacking paradigms. Its original version based on resending single photons was easily neutralized by QKD [
3
].
Employing detector imperfections, more crafty intercept-resend versions have evolved via resending faked multiphoton
states either solitarily (e.g., the after-gate attack [
42
], the faint-after-gate attack [
47
], and the detector-control attack
under specific laser damage [
30
]) or teamed with a blinding light (e.g., continuous-wave blinding attack [
38
,
39
],
sinkhole blinding attack [48], thermal blinding attack [48,45], and pulsed illumination attack [44]).
Currently, there exist two main approaches against the intercept-resend and detector-control hacking strategies. The first
is based on monitoring some detector measures, such as its photocurrent, for anomalously excessive values [
49
,
50
,
51
].
This includes also observing the detector’s count rates versus random variations of either the detection efficiency
[
52
,
53
], or the attenuation in front of the detector [
54
]. These security patches could defeat the original attacks they
were designed for, but unfortunately they fail against subsequent ad-hoc modified attacks [46,55].
The second is the measurement-device-independent QKD (MDI-QKD) approach [
56
], which enables elimination of all
detector side-channels [
57
], offering security regardless of the nature of the detection apparatus. However, MDI QKD
builds on performing a remote Bell-state measurement, which requires high-visibility two-photon interference between
independent photons from Alice’s and Bob’s laser sources, a practically challenging procedure.
In this paper, we present a scheme to protect practical QKD systems against various attacks based on faked-state
light, including the detector-control attacks and more generally the class of intercept–resend attacks. The scheme
uses phase encoding and a two-way configuration, similar to the plug-and-play configuration [
58
,
59
,
60
], which uses
polarization-assisted routing through Bob’s transceiver, and a Faraday mirror at Alice’s site. In our scheme, however,
the polarization qubit serves a different function. A photon generated at Bob’s transceiver is transmitted through a
polarization randomizer, which assigns it a random state of polarization, and upon reflection from the Faraday mirror it
passes once more through the same randomizer, in a state orthogonal to its original state, and is directed to a specific
path, whereupon the photon is detected in accordance with the phase-encoded BB84 protocol. Light pulses generated
by an intruder must pass through the randomizer at the gateway to Bob’s transceiver, and since they pass only once, they
acquire a random state and end up in a different path, whereupon their detection triggers an alert. The randomizer is
fixed during the course of the photon roundtrip and is refreshed after every cycle of photon transmission and detection.
Thus, the polarization qubit serves as a carrier of a password that allows genuine photons to be directed to the secured
detectors, while an intruder’s fake photons are randomized and possibly end up at the alert detectors.
We further consider the case that Eve launches a generalized detector-control attack. To render her attack unnoticeable,
she tailors the parameters of triggering pulses and blinding light in order to meet two requirements: (i) to avoid
triggering alert detectors, and (ii) to be able to sometimes trigger the secured detectors in the right way. These two
requirements lead us to a necessary and sufficient condition that Bob’s secured and alert detectors have to satisfy. We
note that commercially available detectors can violate this necessary and sufficient condition and thereby guarantee
that these two requirements are impossible to meet simultaneously. We experimentally demonstrate how various faked
states by Eve fail to simultaneously meet these two requirements of unnoticeable attack. Security analysis of the system
shows that for various types of attacks Eve cannot diminish the alert rate, even if she has complete control over Bob’s
secured detectors.
2 QKD scheme
As shown in Fig. 1(a), Bob employs a single photon with two encoded qubits: a time-bin qubit communicating the
key, and an ancillary polarization qubit serving as a security pass [
61
]. As in typical interferometric QKD systems,
the photon undergoes a roundtrip from Bob to Alice, where the time-bin qubit is modulated, and sent back to Bob
whereupon it is directed to two sets of detectors depending on its state of polarization. Entry into Bob’s receiver is
2