Next Article in Journal
Disentanglement—Induced Superconductivity
Previous Article in Journal
Layered HARQ Design for LDPC-Based Multi-Level Coded Modulation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Defending Against the Homodyne Detector-Blinding Attack on Continuous-Variable Quantum Key Distribution Using an Adjustable Optical Attenuator

1
School of Automation, Central South University, Changsha 410083, China
2
School of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(6), 631; https://doi.org/10.3390/e27060631
Submission received: 12 May 2025 / Revised: 8 June 2025 / Accepted: 10 June 2025 / Published: 13 June 2025
(This article belongs to the Special Issue Recent Advances in Continuous-Variable Quantum Key Distribution)

Abstract

:
A homodyne detector, which is also a common element in current telecommunication, is a core component of continuous-variable quantum key distribution (CV-QKD) since it is considered the simplest setup for the distinguishing of coherent states with minimum error. However, the theoretical security of CV-QKD is based on the assumption that the responses of the homodyne detector are always linear with respect to the input, which is impossible in practice. In the real world, a homodyne detector has a finite linear domain, so the linearity assumption is broken when the input is too large. Regarding this security vulnerability, the eavesdropper Eve can perform the so-called homodyne detector-blinding attack by saturating the homodyne detector and then stealing key information without being detected by the legitimate users. In this paper, we propose a countermeasure for the homodyne detector-blinding attack by using an adjustable optical attenuator with a feedback structure. Specifically, we estimate the suitable attenuation value in the data processing of CV-QKD and feed it back to the adjustable optical attenuator before the detector in real time. Numerical simulation shows that the proposed countermeasure can effectively defend against homodyne detector-blinding attacks and ensure the security of the Gaussian-modulated coherent state protocol with finite-size effect.

1. Introduction

Continuous variable quantum key distribution (CV-QKD) has received considerable attention because it can encode many secret bits per quantum system and is very suitable for short-range high-rate implementations [1,2,3]. Moreover, CV-QKD is typically based on so-called “coherent states” (the optical states of a good-quality laser) and can be fully implemented at room temperature by using commercial homodyne/heterodyne detectors, which have good compatibility with existing optical communication devices [4]. To date, the most powerful protocol of CV-QKD is the Gaussian-modulated coherent state (GMCS) protocol, or, equivalently, the GG02 protocol, since its theoretical security has been proven with individual attacks, collective attacks, and coherent attacks, in both asymptotic cases and finite-size regimes [5,6,7,8,9]. In addition, most experiments were performed using the GMCS protocol [10,11,12], whose data processing is analyzed with composable security [13,14,15].
However, the theoretical security of the GMCS protocol has been proven under some assumptions [1], such as that both Alice and Bob are trusted without being accessible to the eavesdropper Eve. In other words, the security of CV-QKD is broken if the real-world system does not follow these assumptions. For example, Ref. [16] shows that when some of the losses and noises of Alice or Bob are untrusted, the former security is broken and the bound of secret key rate decreases. This is an important trade-off of CV-QKD, i.e., the value of the secret key rate decreases for increasing levels of security [17]. Another important assumption is that the devices of the CV-QKD system follow their ideal models without unwanted deviation. Unfortunately, in the real world, the operation of the device may deviate from its ideal model caused by the attack of Eve, which leads to the problems of practical security. Specifically, the problems of practical security are due to the gap between the ideal model and the actual model in operation. If the problems existing in actual operation are not fully characterized, Eve can use these security vulnerabilities to support her attack so that she can steal the key information without being detected by Alice and Bob. For example, Eve can perform the laser seeding attack, which injects light into the source’s laser [18,19] and then leads to Alice and Bob making a wrong estimation on both the transmittance and excess noise, as with the secret key rate.
In addition to the source side, detectors are usually regarded as the most vulnerable part of the CV-QKD system. For example, Eve can use the device defects of Bob’s homodyne detector to perform the so-called homodyne detector-blinding attack [20], which does not deceive the shot noise calibration by changing the local oscillator (LO) like a calibration attack or a wavelength attack [21,22], but directly attacks the detector. Since the actual homodyne detector has a limited linear range, Eve introduces an additional light to make the response of the homodyne detector exceed its limited linear range, resulting in parameter estimation deviations between Alice and Bob. Note that one assumes the response of the homodyne detector is always linear with respect to the input when performing the security proof [23]. If the broken linearity is not fully characterized and compensated, Alice and Bob may not detect the existence of Eve and continue to communicate. In this case, Eve can obtain the communication information and break the practical security of the CV-QKD system. One can remove the threat of the homodyne detector-blinding attack by the measurement-device-independent (MDI) idea [24,25,26,27], which is the final solution to completely solve the side channel of the detector. However, the current distance of CV-MDI-QKD is limited, which warrants more advanced detection for the task with longer distance in the future [17,28].
In terms of the attack principle of the homodyne detector-blinding attack, in this paper, we propose a countermeasure based on adjustable optical attenuators with a feedback structure. By using an adjustable optical attenuator, the CV-QKD system can be monitored in real time. It remains effective even when Eve suddenly increases the attack intensity. In detail, we set an adjustable optical attenuator in front of the homodyne detector at Bob’s side. The real-time attenuation value of the adjustable optical attenuator is estimated based on the measurement result after the homodyne detector-blinding attack of the detector. Then, the estimated attenuation value is transmitted to the adjustable optical attenuator, so that the measurement result of the output homodyne detector can be within its finite linear domain. After this countermeasure, Alice and Bob will not wrongly estimate the excess noise and secret key rate, which ensures the security of the CV-QKD system. Numerical simulation shows the performance of the countermeasure with the GMCS protocol under finite-size effects.
The paper is organized as follows. In Section 2, we describe the steps of the GMCS CV-QKD system. In Section 3, we show the imperfection of the homodyne detector and then introduce the principle of the homodyne detector-blinding attack. The corresponding countermeasure is proposed in Section 4, which is based on an adjustable optical attenuator with a feedback structure. Numerical simulation is demonstrated in Section 4, and we conclude the paper in Section 5.

2. GMCS CV-QKD System

The CV-QKD system encodes the key information in the amplitude and phase of coherent states, enabling the use of homodyne or heterodyne detectors to receive and measure the arriving signal, which has good compatibility with classical optical communication systems and low detection cost. In the CV-QKD protocol, the most representative one is the GMCS protocol, and its specific implementation process is as follows:
Alice uses a quantum random number generator to generate random numbers. The generated random numbers are encoded on the input laser so that Alice obtains the initial coherent state. The initial coherent state has its variance attenuated to the variance V A set by the system through the optical attenuator. The quadratures of the coherent state are the position X and the momentum P. Both X and P follow a Gaussian distribution, and their variance is V A , and their mean is 0. Subsequently, Alice sends the prepared coherent state and the LO together to Bob’s end through the optical fiber channel.
Bob randomly selects the measurement basis to measure the quadratures of the N coherent states sent by Alice. Bob creates a set of binary random sequences with N size, where 0 indicates the selection of X for measurement and 1 indicates the selection of P for measurement. Then, a homodyne detector is used to measure the selected quadratures to obtain the measurement results. Subsequently, Bob publicly discloses the measurement basis results, and Alice selects to retain either the quadratures X or P based on the publicly disclosed measurement basis.
Alice and Bob select a portion of the transmitted data for the estimation of transmittance and excess noise. Based on the results of parameter estimation, they calculate the mutual information and the upper bound of the information stolen by Eve and determine whether the communication is secure based on these results. This part of the data used for parameter estimation is discarded and does not participate in the calculation process of subsequent key generation.
When the parameter estimation indicates communication security, Alice and Bob conduct reverse reconciliation on the remaining data. Alice and Bob first discretize their respective data, and Bob publicly discloses a small portion of the bit data to Alice. Alice corrects her own data based on the error correction information sent by Bob. The error correction information is discarded and not used to generate the key. After the error correction, new data with smaller errors is obtained. Subsequently, Alice and Bob determine the hash values based on Bob’s data and the new data corrected by Alice. If the hash values overlap, the determination is successful and the protocol continues. If the hash values do not overlap, the determination fails and the protocol terminates. After successful determination, we perform confidentiality enhancement operations on the data and finally generate a security key that can be used for data encryption.

3. The Principle of the Homodyne Detector-Blinding Attack

3.1. Imperfection of Detectors

In the CV-QKD system, the performance of homodyne detectors is usually measured by electrical noise and efficiency. However, in actual situations, the imperfections of homodyne detectors such as finite linearity domain and imbalance can effect its performance and also leave security loopholes for Eve, which break the actual security of the CV-QKD system. Homodyne detectors consist of the optical part and the electrical part, where the two main defects are the imbalance in the optical part and the finite linear domain in the electrical part.
In homodyne detectors, the signal pulses and the local oscillator (LO) pulses enter the two ports of the 50:50 beam splitter for interference at Bob’s side. The two pulses output from the other two ports of the beam splitter, which are transmitted to two identical p-i-n photodiodes. The two optical pulses are converted into two photocurrents under a certain quantum efficiency. Subsequently, the two photocurrents are subtracted and amplified over a small voltage signal through an amplifier. The voltage signal is further amplified by the second-stage amplifier and detected under the analog-to-digital converter. The final generated data represents the output signal, which is proportional to the orthogonal basis of the input optical signal. The selection of orthogonal bases is determined by the relative phase between the LO pulses and the signal pulses. Due to this imperfection of the homodyne detector’s imbalance, the intensity of the LO light is not completely eliminated. This non-negligible intensity of the LO affects the output, which causes a deviation in the output signal of the homodyne detector. To quantify the influence of this imperfection on the homodyne detector, the shot noise is analyzed when there are no signal pulses but only LO pulses sent to the homodyne detector. Considering the imbalanced homodyne detector model in Ref. [29], the output state of the homodyne detector is given by
X HD = η 1 2 T HD I LO + 2 η T HD 1 T HD I LO X 0 + X ele ,
where η represents the detection efficiency of the homodyne detector, 1 T HD represents the total reflectance, 1 2 T HD is used to describe the total imbalance factors of the homodyne detector, I LO is the number of photons for each LO pulses, X 0 is the vacuum state, X ele is the electrical noise with a variance of v ele , and T HD is the total transmission efficiency including the transmission efficiency of the beam splitter, the optical loss in the fiber channel, and the efficiency of the p-i-n photodiode. The impact of the leakage of LO on the output of the homodyne detector is expressed as the first part of Equation (1), expressed as η 1 2 T HD I LO . According to the expression of X HD , its variance can be expressed as
V HD = η 2 1 2 T HD 2 f LO 2 I LO 2 + 4 1 T HD T HD η I LO + v ele ,
where f LO = I LO 2 I LO 2 / I LO is the ratio of the fluctuation of the intensity of LO varying with the measurement time and I LO 2 represents the noise variance caused by the fluctuation of the intensity of LO. The leakage of LO caused by the imbalance of the homodyne detector leads to offsetting the output signal and also results in LO noise in the variance of the output signal.
In addition to the imperfection of imbalance, the electronic part of the homodyne detector also has the defect of a limited range of linear detection. Beyond this linear range, it has an impact on the output result of the homodyne detector. To ensure the unconditional safety of the CV-QKD system, an important assumption during the analysis is that the orthogonal basis of the output and input after Bob’s measurement with the homodyne detector changes linearly. In practicality, as the input increases, the photocurrent also increases. When the input exceeds a certain threshold, it saturates the electronic devices, thereby causing the output signal of the homodyne detector to become saturated. The saturation of electronic devices is generally due to the saturation of amplifiers or data collectors. The inherent characteristics of amplifiers usually cause them to saturate at just a few volts. To ensure accuracy, the data collector is generally set within the range of [−1v, 1v]. In principle, data collectors can also be set as large as possible, but not infinitely large. The two p-i-n photodiodes in the homodyne detector can also saturate; however, their saturation threshold is relatively high. The total optical power of the LO and the signal pulses is much lower than photodiodes’ threshold. Therefore, the saturation of the p-i-n photodiode is generally not the cause of the detector’s saturation. Consequently, the saturation of the homodyne detector is inevitable in practicality. The saturation of homodyne detectors is represented by a simple model. The output results of the homodyne detector after Bob passes through the analog-to-digital converter can be expressed as [30]
X HDs = S at , X HD > S at X HD , S at < X HD < S at S at , X HD < S at ,
where S at and S at represent the upper and lower bounds of the linear range, respectively. The saturation of the homodyne detector causes a change in the linear relationship between the input and output, resulting in a deviation in the parameter estimation by Alice and Bob, in which security loopholes exist.

3.2. The Homodyne Detector-Blinding Attack

Based on the above analysis of the imperfection of the homodyne detector and the principle of intercept–resend attack, Eve takes advantage of the finite-linearity domain of the homodyne detector to launch the homodyne detector-blinding attack on the system. The process of the homodyne detector-blinding attack is shown in Figure 1. Eve first intercepts all the information sent by Alice and then re-prepares and sends them to Bob. At the same time, a beam of irrelevant classical light is sent to the signal port of the homodyne detector to saturate the output signal of the homodyne detector, and communication information is obtained without being discovered by Alice and Bob.
In a homodyne detector-blinding attack, Alice prepares the Gauss-modulated coherent state X + i P , where X and P are expressed as
X = X A + X 0 ,
P = P A + P 0 ,
where X A and P A represent the preparation variances and X 0 and P 0 represent the vacuum state with variances of one unit of shot noise. Eve intercepts the quantum signal sent by Alice and simultaneously measures the X and P with a heterodyne detector. Since X and P are symmetrical, only X is analyzed subsequently. The measurement result of X is expressed as
X M = 1 2 X A + X 0 + X 0 ,
where X 0 represents the vacuum state introduced by the heterodyne detector and 1/ 2 is the loss caused by the heterodyne detector during the process of measurement. Based on the measured results from the heterodyne detector, Eve re-prepares the coherent state X E + i P E and sends it to Bob through the channel with a transmittance of T. The re-prepared X E is expressed as
X E = g 2 X A + X 0 + X 0 + X 0 ,
where g = 1 / 2 is to compensate for the loss caused by the heterodyne detector and X 0 is the noise with a variance of one shot noise unit introduced by Eve in re-preparing the coherent state. All the estimated parameters can be normalized to the shot noise.
As Eve re-prepares the signal pulse sent to Bob, she inserts an external laser into the signal port of Bob’s homodyne detector. The homodyne detector at Bob’s side measures the signal pulses transmitted by Eve and the external laser pulses. Ideally, the linear range of the homodyne detector is ( , + ) , and the output of the homodyne detector can be expressed as
X Bi = η I LO η T X E + X tech + 1 η T X 0 + X E , ext + X ele ,
where X tech is the technical noise generated by the devices of Eve, Alice, and Bob. X 0 is another vacuum state caused by Bob’s homodyne detector. X E , ext are the external laser states introduced by Eve to affect the output of the homodyne detector at Bob. They can be expressed as
X E , ext = η 1 2 T ext I ext + 2 η T ext 1 T ext I ext X 0 ,
where T ext represents the overall transmission of the external laser pulse entering the signal port, I ext is the number of photons for each external laser pulses, and X 0 indicates the vacuum state that interferes with the external laser. The overall imbalance factor of the external laser pulse 1 2 T ext will cause a non-negligible offset to the output results of the homodyne detector. The noise generated by the external laser inserted by Eve can be divided into two parts. One part is a kind of laser intensity fluctuation noise V ext caused by the imbalance of the homodyne detector at Bob and the incomplete reduction in the local oscillator light. It is expressed as the first half of the expression in Equation (9). The other one is the shot noise N ext of the external laser itself, which is expressed as the second half of the expression in Equation (9). Normalizing them into the shot noise unit N 0 = η I LO , these two types of noise and the total external laser noise V tot inserted by Eve can be expressed, respectively, as
V ext = η f ext 2 1 2 T ext 2 I ext 2 / I LO ,
N ext = 4 T ext 1 T ext I ext / I LO ,
V tot = V ext + N ext = η f ext 2 1 2 T ext 2 I ext 2 / I LO + 4 T ext 1 T ext I ext / I LO ,
where f ext is the fluctuation ratio of the intensity of external laser pulses. Since V tot is the noise caused by the insertion of an external laser on the Bob side, the channel transmittance T needs to be considered when it comes to the equivalent noise on Alice’s side. The additional excess noise ε ext caused by the external laser pulse introduced by Eve can be expressed as
ε ext = V tot / T = η f ext 2 1 2 T ext 2 I ext 2 / I LO T + 4 T ext 1 T ext I ext / I LO T .
Figure 2 describes the total excess noise V tot , self-shot noise N ext , and external laser intensity fluctuation noise V ext when Eve inserts an external laser under different f ext . In Figure 2, R is the ratio between the photon number of one of Eve’s external light pulses and one of Bob’s LO pulses, which is expressed as R = I ext / I LO . It can be seen from Figure 2a that when Eve uses a relatively stable laser light source, that is, f ext = 2%, the red line and the blue line are relatively close, and as the R increases, the red line and the black line are closer and farther away from the blue line. At this time, the main source of the noise of the external laser pulse is its own shot noise N ext . It can be seen from Figure 2b that when Eve uses a general laser light source, f ext = 0.1 %, the red solid line and the black dashed line basically return, but there is a large gap from the blue dashed line. Therefore, the noise of the external laser excitation pulse mainly comes from the noise V ext of the external laser intensity fluctuation. The cross-noise of the red dotted line at a distance of 60 km in the figure is significantly greater than that of the red solid line at a distance of 40 km. Since the channel transmittance T is related to the distance and T increases with the increase in distance, the external laser noise of Eve will also increase with the increase in the distance between Alice and Bob.
When the linear range of the homodyne detector in the CV-QKD system is infinite, Alice and Bob can easily detect the existence of Eve in the parameter estimation due to the noise introduced by the external laser pulses. However, in the actual implementation, the linear response range of the homodyne detector is finite. Eve can change the measured results of the homodyne detector by introducing external laser pulses, resulting in the output results of the homodyne detector at the Bob end exceeding their limited linear domain. When conducting parameter estimation, Alice and Bob might think that their excess noise ε is lower than the threshold for generating a zero key rate, which would make them believe that the system is secure without detecting the existence of Eve. Eve receives the classic communication between Alice and Bob to obtain the key, as both communicating parties successfully stole the information.

4. Countermeasure with Adjustable Optical Attenuator

Eve exploits a homodyne detector-blinding attack to cause deviations in the estimation of estimated excess noise between the legitimate communicating parties, Alice and Bob, resulting in potential security vulnerabilities. To defend against this kind of attack, we adopt a countermeasure based on an adjustable optical attenuator, which is shown in Figure 3. When analyzing the system, we regard the adjustable optical attenuator as an ideal device and place it at the front of the homodyne detector at Bob’s side. We suppose that the initial attenuation value α t of the adjustable optical attenuator is one. The data sent from Alice is attenuated by the adjustable optical attenuator and then enters the homodyne detector with a finite linear range for measurement. The measured results are used to estimate the attenuation value of the adjustable optical attenuator, and the generated attenuation value is fed back to the adjustable optical attenuator for superposition. Based on the attenuation value after feedback, the subsequent data sent to the Bob end is attenuated, and the process of estimating the above-mentioned attenuation value is repeated. When no attenuation value occurs, we compensate for the measured results during data post-processing. Subsequently, these data are used by Alice and Bob to estimate the excess noise and secret key rate. When there are still attenuation values generated, it continues to superimpose on the attenuation values of the original adjustable optical attenuator to attenuate the subsequent transmitted data until no attenuation values are generated. When Eve knows that we use the method of attenuating the transmitted light to defend against the attack, she increases the intensity of the external laser. The countermeasure we proposed is still effective.
We take the minimum X A and the minimum X B as the origin for establishing the coordinate system ( X A min , X B min ) . X sat B and X sat B represent the upper and lower bounds of the finite linear range of the homodyne detector. When Eve introduces an external laser pulse, it causes some measured results to exceed the upper bound of the finite linear range. The excess part of the measured results will be equal to X sat B . In this part of the measured results, we find the minimum abscissa X min A and the maximum abscissa X max A when the measured result is X sat B . Based on the points ( X A min , X B min ) and ( X min A , X sat B ) , we can obtain the slope k 1 . Based on the points ( X A min , X B min ) and ( X max A , X sat B ) , we can obtain the slope k 2 . X max B is the vertical coordinate when the horizontal coordinate below is X max A in the slope k 1 . To ensure that the measurement results can be attenuated within the finite linear range of the homodyne detector, we perform to attenuate them through an adjustable optical attenuator. The attenuation value α t can be expressed as
α t = X sat B / X max B ,
After being attenuated by the adjustable optical attenuator, the measured results do not exceed the upper and lower bounds of the homodyne detector. However, measuring with the data attenuated by the adjustable optical attenuator can lead to a reduction in the measured results. The modulation variance of Alice at the transmitting end remains unchanged, while the variance of the measured result of the homodyne detector at Bob’s side will decrease, which will affect the excess noise when Alice and Bob estimate the parameters. Therefore, in the post-processing stage of the data, we compensate for the attenuated measurement results to make the estimated excess noise consistent with the results in the infinite linear domain of the homodyne detector.

5. Performance Analysis

Conducting a security analysis of the CV-QKD system, we first make assumptions about the implementation of CV-QKD and the external laser inserted by Eve. The simulation parameters are assumed as follows: The number of photons contained in one local oscillator’s optical pulses at Bob’s side is I LO = 10 8 . The efficiency of the homodyne detector at Bob’s side is η = 0.6 . The homodyne detector is a balanced homodyne detector. The LO leakage caused by its imbalance can be ignored in the study of this paper. The variance of electrical noise is v ele = 0.01 N 0 . N 0 = η I LO is the shot noise variance. The upper and lower bounds of the linear detection of the homodyne detector are | S at | = 20 N 0 . Eve inserts an external laser beam into the signal port of Bob’s homodyne detector, and its overall transmission on Bob’s homodyne detector is T ext = 0.49 . The loss between Alice and Bob is T = 10 α l L / 10 with α l = 0.2 dB/km; Alice’s modulation is variance V A = 16 .
For the analysis of the secret key rate, we consider collective attacks and the secret key rate K fi under the finite size, which is expressed as [6,31]
K fi = n N β I AB χ BE Δ ( n ) ,
where β = 95 % represents the reverse coordination efficiency, N = 10 8 represents the data size of the data block, and n = 0.9 N represents the data block size that generates the secret key rate. χ BE represents the Holevo bound, which is the maximum amount of information that Eve extracts from Bob’s data. I AB represents the Shannon mutual information between Alice and Bob, and it can be expressed as [31]
I AB = 1 2 log 2 V B V B A = 1 2 log 2 V + χ tot 1 + χ tot ,
where V = V A + 1 and V A represents the variance of Alice’s preparation. χ tot represents the total noise of the channel input, which can be expressed as
χ tot = 1 T 1 + ε + ( 1 η ) + v ele η T ,
where ε represents the excess noise estimated by Alice and Bob under the finite size. Δ ( n ) is related to the security of privacy amplification and is expressed as
Δ ( n ) ( 2 dim H + 3 ) log 2 ( 2 / ϵ ¯ ) n + 2 n log 2 1 + ϵ PA ,
where dim H = 2 and H represents the Hilbert space. ϵ ¯ = 10 10 is the smoothing parameter, and ϵ PA is the probability of the privacy amplification program failing. At n 10 4 , Δ ( n ) is essentially determined by the first term of the identity and thus can be expressed as
Δ ( n ) 7 log 2 ( 2 / ϵ ¯ ) n .
Figure 4 describes the results of the estimated excess noise varying with R under the finite size. V A is the optimal Gaussian modulation variance at this distance. In the linear interval of the homodyne detector, the estimated excess noise increases with the increase in distance and R. At the same distance, the estimated excess noise is composed of fixed noise and variable noise that increases with R. The variable noise is related to the external light inserted by Eve. It can be seen from the figure that when R > 0.124 , the estimated excess noise decreases sharply. This is because the external beam input by Eve causes the measured results to exceed the linear measurement range of the homodyne detector, offsetting Alice and Bob’s estimation of excess noise. Eve can make the estimated excess noise close to 0 at a certain distance by choosing an appropriate R, that is, the generated excess noise is lower than the threshold for achieving the empty secret key rate.
Figure 5 shows the estimated secret key rate corresponding to the excess noise in Figure 4. In the figure, only the part where the estimated excess noise is positive is estimated for the secret key rate, and the case where the estimated excess noise is negative is not considered. Eve can estimate I ex = R I LO and f ex I ex based on R and I LO , where f ex represents the fluctuation ratio of the input external laser intensity. Then, we select the appropriate number of photons and the appropriate photon stability level on an external laser pulse. To generate a positive key rate between Alice and Bob, based on the parameter estimation results, the legally communicating parties believe that their communication is secure. However, due to Eve’s behavior, the generated key is not secure in practice.
Figure 6 shows the parameter estimation results after defending against the homodyne detector-blinding attack in the CV-QKD system based on the adjustable optical attenuator. The attenuation value is estimated based on the output results of the homodyne detector after the homodyne detector-blinding attack, and then the attenuation value is fed back to an adjustable optical attenuator to attenuate the subsequent data. Since estimating the parameters after resisting the homodyne detector-blinding attack at different distances leads to similar conclusions, we take a distance of 40 km and the Alice modulation variance V A = 5.5 as an example to describe the parameter results after the countermeasure in Figure 6. The blue line in the figure represents the estimated excess noise, and the pink line is the key rate result corresponding to the estimated excess noise of the blue line. After implementing the adjustable optical attenuator, the measured results show that within the finite linear domain of the homodyne detector, the estimated excess noise is greater than two shot noise units and keeps increasing with the increase in R. Under these estimated excess noises, the secret key rate is less than zero. Alice and Bob can determine that the system has been attacked based on the negative key rate, even if the communication is terminated. Therefore, the method based on the adjustable optical attenuator can effectively resist the homodyne detector-blinding attack and ensure the security of system communication.

6. Conclusions

In this paper, we have analyzed the homodyne detector-blinding attack under a finite size and proposed a countermeasure based on an adjustable optical attenuator with a feedback structure. By estimating the attenuation value in the data processing stage and feeding it back to the adjustable optical attenuator, the measurement result of the output homodyne detector can be within its finite linear domain. Then, Alice and Bob will not wrongly estimate the excess noise and secret key rate. Numerical simulation shows the effectiveness of the proposed countermeasure. In addition, it remains effective even when Eve suddenly increases the attack intensity or changes the wavelength of the inserted external laser pulses. According to the negative key rate, the two legally communicating parties can detect the existence of Eve and immediately terminate the communication, successfully defending against the homodyne detector-blinding attack.

Author Contributions

Conceptualization, Y.W. and W.J.; writing—original draft preparation, Y.W. and Y.L.; writing—review, Y.G.; writing—editing, Y.W. and W.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no funding.

Data Availability Statement

All data generated or analyzed during this study are included in this published article.

Acknowledgments

We would like to thank Zhiyue Zuo for the helpful discussion.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Xu, F.; Ma, X.; Zhang, Q.; Lo, H.K.; Pan, J.W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 2020, 92, 025002. [Google Scholar] [CrossRef]
  2. Laudenbach, F.; Pacher, C.; Fung, C.H.F.; Poppe, A.; Peev, M.; Schrenk, B.; Hentschel, M.; Walther, P.; Hübel, H. Continuous-variable quantum key distribution with Gaussian modulation—The theory of practical implementations. Adv. Quantum Technol. 2018, 1, 1800011. [Google Scholar] [CrossRef]
  3. Grosshans, F.; Grangier, P. Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef]
  4. Weedbrook, C.; Pirandola, S.; García-Patrón, R.; Cerf, N.J.; Ralph, T.C.; Shapiro, J.H.; Lloyd, S. Gaussian quantum information. Rev. Mod. Phys. 2012, 84, 621–669. [Google Scholar] [CrossRef]
  5. Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photonics 2020, 12, 1012–1236. [Google Scholar] [CrossRef]
  6. Leverrier, A.; Grosshans, F.; Grangier, P. Finite-size analysis of a continuous-variable quantum key distribution. Phys. Rev. A At. Mol. Opt. Phys. 2010, 81, 062343. [Google Scholar] [CrossRef]
  7. Navascués, M.; Grosshans, F.; Acín, A. Optimality of Gaussian attacks in continuous-variable quantum cryptography. Phys. Rev. Lett. 2006, 97, 190502. [Google Scholar] [CrossRef]
  8. García-Patrón, R.; Cerf, N.J. Unconditional Optimality of Gaussian Attacks against Continuous-Variable Quantum Key Distribution. Phys. Rev. Lett. 2006, 97, 190503. [Google Scholar] [CrossRef]
  9. Renner, R.; Cirac, J.I. de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. Phys. Rev. Lett. 2009, 102, 110504. [Google Scholar] [CrossRef]
  10. Jain, N.; Chin, H.M.; Mani, H.; Lupo, C.; Nikolic, D.S.; Kordts, A.; Pirandola, S.; Pedersen, T.B.; Kolb, M.; Ömer, B.; et al. Practical continuous-variable quantum key distribution with composable security. Nat. Commun. 2022, 13, 4740. [Google Scholar] [CrossRef]
  11. Hajomer, A.A.; Derkach, I.; Jain, N.; Chin, H.M.; Andersen, U.L.; Gehring, T. Long-distance continuous-variable quantum key distribution over 100-km fiber with local local oscillator. Sci. Adv. 2024, 10, eadi9474. [Google Scholar] [CrossRef] [PubMed]
  12. Wang, T.; Zuo, Z.; Li, L.; Huang, P.; Guo, Y.; Zeng, G. Continuous-variable quantum key distribution without synchronized clocks. Phys. Rev. Appl. 2022, 18, 014064. [Google Scholar] [CrossRef]
  13. Mountogiannakis, A.G.; Papanastasiou, P.; Braverman, B.; Pirandola, S. Composably secure data processing for Gaussian-modulated continuous-variable quantum key distribution. Phys. Rev. Res. 2022, 4, 013099. [Google Scholar] [CrossRef]
  14. Papanastasiou, P.; Mountogiannakis, A.G.; Pirandola, S. Composable security of CV-MDI-QKD with secret key rate and data processing. Sci. Rep. 2023, 13, 11636. [Google Scholar] [CrossRef]
  15. Mountogiannakis, A.G.; Papanastasiou, P.; Pirandola, S. Data postprocessing for the one-way heterodyne protocol under composable finite-size security. Phys. Rev. A 2022, 106, 042606. [Google Scholar] [CrossRef]
  16. Pirandola, S. Composable security for continuous variable quantum key distribution: Trust levels and practical key rates in wired and wireless networks. Phys. Rev. Res. 2021, 3, 043014. [Google Scholar] [CrossRef]
  17. Pirandola, S. Architectures for QKD networks. In Proceedings of the Photonics for Quantum 2022, Strasbourg, France, 3–7 April 2022; SPIE: St. Bellingham, WA, USA, 2022; Volume 12243, pp. 51–58. [Google Scholar]
  18. Zheng, Y.; Huang, P.; Huang, A.; Peng, J.; Zeng, G. Security analysis of practical continuous-variable quantum key distribution systems under laser seeding attack. Opt. Express 2019, 27, 27369–27384. [Google Scholar] [CrossRef]
  19. Peng, Q.; Gao, B.; Wang, D.; Liao, Q.; Zuo, Z.; Zhong, H.; Huang, A.; Guo, Y. Defending against a laser-seeding attack on continuous-variable quantum key distribution using an improved optical power limiter. Phys. Rev. A 2023, 108, 052616. [Google Scholar] [CrossRef]
  20. Qin, H.; Kumar, R.; Makarov, V.; Alléaume, R. Homodyne-detector-blinding attack in continuous-variable quantum key distribution. Phys. Rev. A 2018, 98, 012312. [Google Scholar] [CrossRef]
  21. Jouguet, P.; Kunz-Jacques, S.; Diamanti, E. Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution. Phys. Rev. A At. Mol. Opt. Phys. 2013, 87, 062313. [Google Scholar] [CrossRef]
  22. Huang, J.Z.; Weedbrook, C.; Yin, Z.Q.; Wang, S.; Li, H.W.; Chen, W.; Guo, G.C.; Han, Z.F. Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack. Phys. Rev. A At. Mol. Opt. Phys. 2013, 87, 062329. [Google Scholar] [CrossRef]
  23. Huang, J.Z.; Kunz-Jacques, S.; Jouguet, P.; Weedbrook, C.; Yin, Z.Q.; Wang, S.; Chen, W.; Guo, G.C.; Han, Z.F. Quantum hacking on quantum key distribution using homodyne detection. Phys. Rev. A 2014, 89, 032304. [Google Scholar] [CrossRef]
  24. Braunstein, S.L.; Pirandola, S. Side-channel-free quantum key distribution. Phys. Rev. Lett. 2012, 108, 130502. [Google Scholar] [CrossRef] [PubMed]
  25. Pirandola, S.; Ottaviani, C.; Spedalieri, G.; Weedbrook, C.; Braunstein, S.L.; Lloyd, S.; Gehring, T.; Jacobsen, C.S.; Andersen, U.L. High-rate measurement-device-independent quantum cryptography. Nat. Photon. 2015, 9, 397–402. [Google Scholar] [CrossRef]
  26. Ottaviani, C.; Lupo, C.; Laurenza, R.; Pirandola, S. Modular network for high-rate quantum conferencing. Commun. Phys. 2019, 2, 118. [Google Scholar] [CrossRef]
  27. Ghalaii, M.; Pirandola, S. Continuous-variable measurement-device-independent quantum key distribution in free-space channels. Phys. Rev. A 2023, 108, 042621. [Google Scholar] [CrossRef]
  28. Fletcher, A.I.; Harney, C.; Ghalaii, M.; Papanastasiou, P.; Mountogiannakis, A.; Spedalieri, G.; Hajomer, A.A.; Gehring, T.; Pirandola, S. An Overview of CV-MDI-QKD. arXiv 2025, arXiv:2501.09818. [Google Scholar]
  29. Ma, X.C.; Sun, S.H.; Jiang, M.S.; Liang, L.M. Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol. Phys. Rev. A At. Mol. Opt. Phys. 2013, 87, 052309. [Google Scholar] [CrossRef]
  30. Qin, H.; Kumar, R.; Alléaume, R. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution. Phys. Rev. A 2016, 94, 012325. [Google Scholar] [CrossRef]
  31. Fossier, S.; Diamanti, E.; Debuisschert, T.; Tualle-Brouri, R.; Grangier, P. Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers. J. Phys. B At. Mol. Opt. Phys. 2009, 42, 114014. [Google Scholar] [CrossRef]
Figure 1. The process of the homodyne detector-blinding attack. BS: beam splitter.
Figure 1. The process of the homodyne detector-blinding attack. BS: beam splitter.
Entropy 27 00631 g001
Figure 2. The total excess noise V tot of the inserted external laser, the self-shot noise N ext , and the external laser intensity fluctuation noise N ext . (a) f ext = 2 % ; (b) f ext = 0.1 % .
Figure 2. The total excess noise V tot of the inserted external laser, the self-shot noise N ext , and the external laser intensity fluctuation noise N ext . (a) f ext = 2 % ; (b) f ext = 0.1 % .
Entropy 27 00631 g002
Figure 3. System diagram of CV-QKD based on adjustable optical attenuator. GMCS: Gaussian modulated coherent state; AM: amplitude modulator; PM: phase modulator; BS: beam splitter; PD: photodetector; AOA: adjustable optical attenuator; LO: local oscillator.
Figure 3. System diagram of CV-QKD based on adjustable optical attenuator. GMCS: Gaussian modulated coherent state; AM: amplitude modulator; PM: phase modulator; BS: beam splitter; PD: photodetector; AOA: adjustable optical attenuator; LO: local oscillator.
Entropy 27 00631 g003
Figure 4. Estimated excess noise of CV-QKD system under homodyne detector-blinding attack.
Figure 4. Estimated excess noise of CV-QKD system under homodyne detector-blinding attack.
Entropy 27 00631 g004
Figure 5. Secret key rate of CV-QKD system under homodyne detector-blinding attacks.
Figure 5. Secret key rate of CV-QKD system under homodyne detector-blinding attacks.
Entropy 27 00631 g005
Figure 6. Security analysis of the CV-QKD system based on an adjustable optical attenuator defending against a homodyne detector-blinding attack.
Figure 6. Security analysis of the CV-QKD system based on an adjustable optical attenuator defending against a homodyne detector-blinding attack.
Entropy 27 00631 g006
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, Y.; Li, Y.; Jiang, W.; Guo, Y. Defending Against the Homodyne Detector-Blinding Attack on Continuous-Variable Quantum Key Distribution Using an Adjustable Optical Attenuator. Entropy 2025, 27, 631. https://doi.org/10.3390/e27060631

AMA Style

Wang Y, Li Y, Jiang W, Guo Y. Defending Against the Homodyne Detector-Blinding Attack on Continuous-Variable Quantum Key Distribution Using an Adjustable Optical Attenuator. Entropy. 2025; 27(6):631. https://doi.org/10.3390/e27060631

Chicago/Turabian Style

Wang, Yijun, Yanyan Li, Wenqi Jiang, and Ying Guo. 2025. "Defending Against the Homodyne Detector-Blinding Attack on Continuous-Variable Quantum Key Distribution Using an Adjustable Optical Attenuator" Entropy 27, no. 6: 631. https://doi.org/10.3390/e27060631

APA Style

Wang, Y., Li, Y., Jiang, W., & Guo, Y. (2025). Defending Against the Homodyne Detector-Blinding Attack on Continuous-Variable Quantum Key Distribution Using an Adjustable Optical Attenuator. Entropy, 27(6), 631. https://doi.org/10.3390/e27060631

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop