The rationale for the optimal continuous-variable quantum key distribution protocol

R Goncharov, I Vorontsova, D Kirichenko, I Filipov… - Optics, 2022 - mdpi.com
This article describes the current technical level of developments in the field of continuous-
variable quantum key distribution (CV-QKD). Various classifications are described, the …

Laser-damage attack against optical attenuators in quantum key distribution

A Huang, R Li, V Egorov, S Tchouragoulov, K Kumar… - Physical Review …, 2020 - APS
Many quantum key distribution systems employ a laser followed by an optical attenuator to
prepare weak coherent states in the source. Their mean photon number must be …

Controlling single-photon detector ID210 with bright light

V Chistiakov, A Huang, V Egorov, V Makarov - Optics express, 2019 - opg.optica.org
We experimentally demonstrate that a single-photon detector ID210 commercially available
from ID Quantique is vulnerable to blinding and can be fully controlled by bright illumination …

Subcarrier wave continuous variable quantum key distribution with discrete modulation: mathematical model and finite-key analysis

E Samsonov, R Goncharov, A Gaidash, A Kozubov… - Scientific Reports, 2020 - nature.com
In this paper we report a continuous-variable quantum key distribution protocol using
multimode coherent states generated on subcarrier frequencies of the optical spectrum. We …

An approach for security evaluation and certification of a complete quantum communication system

S Sajeed, P Chaiwongkhot, A Huang, H Qin… - Scientific Reports, 2021 - nature.com
Although quantum communication systems are being deployed on a global scale, their
realistic security certification is not yet available. Here we present a security evaluation and …

Seeding Gaussian boson samplers with single photons for enhanced state generation

V Crescimanna, AZ Goldberg, K Heshami - Physical Review A, 2024 - APS
Non-Gaussian quantum states are crucial to fault-tolerant quantum computation with
continuous-variable systems. Usually, generation of such states involves trade-offs between …

Loopholes in the 1500–2100-nm Range for Quantum-Key-Distribution Components: Prospects for Trojan-Horse Attacks

B Nasedkin, F Kiselev, I Filipov, D Tolochko… - Physical Review …, 2023 - APS
Vulnerabilities of components used in quantum-key-distribution systems affect its
implementation security and must be taken into consideration during system development …

Feasibility of twin-field quantum key distribution based on multi-mode coherent phase-coded states

V Chistiakov, A Kozubov, A Gaidash, A Gleim… - Optics …, 2019 - opg.optica.org
In this paper we propose feasibility demonstration of twin-field quantum key ditribution
system based on multi-mode weak coherent phase-coded states. Their utilization provides …

Quantum control attack: Towards joint estimation of protocol and hardware loopholes

A Kozubov, A Gaidash, G Miroshnichenko - Physical Review A, 2021 - APS
In this paper we present the approach for description of quantum control attack based on
combined protocol and hardware loopholes. It consolidates intercept-resend attack and …

Fully measurement-device-independent two-way quantum key distribution with finite single-photon sources

GD Kang, J Liu, T Zhang, QP Zhou, MF Fang - Quantum Information …, 2024 - Springer
Despite the proven security in theory and its potential to achieve high secret key rates,
eavesdroppers may crack two-way quantum key distribution (TWQKD) systems by exploiting …