The rationale for the optimal continuous-variable quantum key distribution protocol
This article describes the current technical level of developments in the field of continuous-
variable quantum key distribution (CV-QKD). Various classifications are described, the …
variable quantum key distribution (CV-QKD). Various classifications are described, the …
Laser-damage attack against optical attenuators in quantum key distribution
Many quantum key distribution systems employ a laser followed by an optical attenuator to
prepare weak coherent states in the source. Their mean photon number must be …
prepare weak coherent states in the source. Their mean photon number must be …
Controlling single-photon detector ID210 with bright light
We experimentally demonstrate that a single-photon detector ID210 commercially available
from ID Quantique is vulnerable to blinding and can be fully controlled by bright illumination …
from ID Quantique is vulnerable to blinding and can be fully controlled by bright illumination …
Subcarrier wave continuous variable quantum key distribution with discrete modulation: mathematical model and finite-key analysis
In this paper we report a continuous-variable quantum key distribution protocol using
multimode coherent states generated on subcarrier frequencies of the optical spectrum. We …
multimode coherent states generated on subcarrier frequencies of the optical spectrum. We …
An approach for security evaluation and certification of a complete quantum communication system
Although quantum communication systems are being deployed on a global scale, their
realistic security certification is not yet available. Here we present a security evaluation and …
realistic security certification is not yet available. Here we present a security evaluation and …
Seeding Gaussian boson samplers with single photons for enhanced state generation
V Crescimanna, AZ Goldberg, K Heshami - Physical Review A, 2024 - APS
Non-Gaussian quantum states are crucial to fault-tolerant quantum computation with
continuous-variable systems. Usually, generation of such states involves trade-offs between …
continuous-variable systems. Usually, generation of such states involves trade-offs between …
Loopholes in the 1500–2100-nm Range for Quantum-Key-Distribution Components: Prospects for Trojan-Horse Attacks
B Nasedkin, F Kiselev, I Filipov, D Tolochko… - Physical Review …, 2023 - APS
Vulnerabilities of components used in quantum-key-distribution systems affect its
implementation security and must be taken into consideration during system development …
implementation security and must be taken into consideration during system development …
Feasibility of twin-field quantum key distribution based on multi-mode coherent phase-coded states
In this paper we propose feasibility demonstration of twin-field quantum key ditribution
system based on multi-mode weak coherent phase-coded states. Their utilization provides …
system based on multi-mode weak coherent phase-coded states. Their utilization provides …
Quantum control attack: Towards joint estimation of protocol and hardware loopholes
In this paper we present the approach for description of quantum control attack based on
combined protocol and hardware loopholes. It consolidates intercept-resend attack and …
combined protocol and hardware loopholes. It consolidates intercept-resend attack and …
Fully measurement-device-independent two-way quantum key distribution with finite single-photon sources
GD Kang, J Liu, T Zhang, QP Zhou, MF Fang - Quantum Information …, 2024 - Springer
Despite the proven security in theory and its potential to achieve high secret key rates,
eavesdroppers may crack two-way quantum key distribution (TWQKD) systems by exploiting …
eavesdroppers may crack two-way quantum key distribution (TWQKD) systems by exploiting …