Practical Countermeasure Against Attacks Exploiting Detection Efficiency Mismatch in Quantum Key Distribution
Abstract
We demonstrate a practical countermeasure against a well-known class of attacks on quantum key distribution (QKD) systems that exploit detection efficiency mismatch, where the receiver's detectors do not exhibit identical responses to incoming photons across all degrees of freedom. This class of quantum hacking strategies is broad and significantly includes the time-shift attack, which targets an arrival-time-dependent side channel at the receiver. The four-state countermeasure, previously only ...
Description / Details
We demonstrate a practical countermeasure against a well-known class of attacks on quantum key distribution (QKD) systems that exploit detection efficiency mismatch, where the receiver's detectors do not exhibit identical responses to incoming photons across all degrees of freedom. This class of quantum hacking strategies is broad and significantly includes the time-shift attack, which targets an arrival-time-dependent side channel at the receiver. The four-state countermeasure, previously only proven to be secure in theory, is implemented here on a GHz-clocked prototype QKD system and evaluated for its security and performance. We show that its presence enables almost complete recovery of the system's ideal secret key rate. Our results provide strong justification for adopting this countermeasure as a standard component in future scalable and practical QKD systems.
Source: arXiv:2605.22580v1 - http://arxiv.org/abs/2605.22580v1 PDF: https://arxiv.org/pdf/2605.22580v1 Original Link: http://arxiv.org/abs/2605.22580v1
Please sign in to join the discussion.
No comments yet. Be the first to share your thoughts!
May 23, 2026
Quantum Computing
Quantum Physics
0