{"title":"Defending Against Saturation Attacks on Atmospheric Continuous-Variable Quantum Key Distribution","authors":"Xiaoli Fang, Hui Peng","doi":"10.1007/s10773-025-05886-x","DOIUrl":null,"url":null,"abstract":"<div><p>The theoretical security of continuous variable quantum key distribution (CV-QKD ) has been proved. However the gap between the theoretical model and the practical model can lead to the threat of the actual security of CV-QKD system in practice. An eavesdropper can use the imperfection of the homodyne detector to perform the saturation attacks. She can successfully obtain information without being detected by legitimate communication parties. In this paper, we analyze saturation attacks through atmospheric channels in CV-QKD system, and use mean-limited least square method to fit straight lines to defend against saturation attacks. Simulation results show that legal participants evaluate the information that has been eavesdropped because the secret key rate is negative.</p></div>","PeriodicalId":597,"journal":{"name":"International Journal of Theoretical Physics","volume":"64 4","pages":""},"PeriodicalIF":1.7000,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Theoretical Physics","FirstCategoryId":"101","ListUrlMain":"https://link.springer.com/article/10.1007/s10773-025-05886-x","RegionNum":4,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"PHYSICS, MULTIDISCIPLINARY","Score":null,"Total":0}
引用次数: 0
Abstract
The theoretical security of continuous variable quantum key distribution (CV-QKD ) has been proved. However the gap between the theoretical model and the practical model can lead to the threat of the actual security of CV-QKD system in practice. An eavesdropper can use the imperfection of the homodyne detector to perform the saturation attacks. She can successfully obtain information without being detected by legitimate communication parties. In this paper, we analyze saturation attacks through atmospheric channels in CV-QKD system, and use mean-limited least square method to fit straight lines to defend against saturation attacks. Simulation results show that legal participants evaluate the information that has been eavesdropped because the secret key rate is negative.
期刊介绍:
International Journal of Theoretical Physics publishes original research and reviews in theoretical physics and neighboring fields. Dedicated to the unification of the latest physics research, this journal seeks to map the direction of future research by original work in traditional physics like general relativity, quantum theory with relativistic quantum field theory,as used in particle physics, and by fresh inquiry into quantum measurement theory, and other similarly fundamental areas, e.g. quantum geometry and quantum logic, etc.