Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Attack detection scheme for continuous variable quantum key distribution based on a graph neural network

Not Accessible

Your library or personal account may give you access

Abstract

The practical security of a continuous-variable quantum key distribution (CV-QKD) system is vulnerable to various attack strategies due to the significant difference between the idealized theoretical model and the practical physical system. The existing countermeasures against these attacks involve exploiting different real-time monitoring modules, which presents a challenge in effectively classifying attacks. We investigate a graph neural network (GNN)-based attack detection scheme for CV-QKD, which models data as a graph structure using three different methods for various conditions. Particularly, one of the proposed methods requires no additional devices and can detect attacks with over 99% accuracy. The algorithm can be expanded to different scenarios without additional training and can achieve a detection efficiency of more than 95%. Furthermore, our proposed scheme incorporates anomaly detection algorithms into the detection module, enabling 85% effective detection of partially unknown attacks with minimal security data.

© 2024 Optica Publishing Group

Full Article  |  PDF Article
More Like This
Sifting scheme for continuous-variable quantum key distribution with short samples

Zijie Wu, Yijun Wang, Ling Zhang, Yiyu Mao, Haisen Luo, Ying Guo, and Duan Huang
J. Opt. Soc. Am. B 39(3) 694-704 (2022)

Neural network method: withstanding noise for continuous-variable quantum key distribution with discrete modulation

Dingmin Cheng, Yewei Guo, Jiayang Dai, Hao Wu, and Ying Guo
J. Opt. Soc. Am. B 41(4) 879-886 (2024)

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (7)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (2)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (34)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.