Laser-damage attack against optical attenuators in quantum key distribution
Many quantum key distribution systems employ a laser followed by an optical attenuator to
prepare weak coherent states in the source. Their mean photon number must be …
prepare weak coherent states in the source. Their mean photon number must be …
Quantum key distribution: Modeling and simulation through bb84 protocol using python3
A Adu-Kyere, E Nigussie, J Isoaho - Sensors, 2022 - mdpi.com
Autonomous “Things” is becoming the future trend as the role, and responsibility of IoT keep
diversifying. Its applicability and deployment need to re-stand technological advancement …
diversifying. Its applicability and deployment need to re-stand technological advancement …
Boosting quantum key distribution via the end-to-end loss control
With the rise of quantum technologies, data security increasingly relies on quantum
cryptography and its most notable application, quantum key distribution (QKD). Yet, current …
cryptography and its most notable application, quantum key distribution (QKD). Yet, current …
Loopholes in the 1500–2100-nm range for quantum-key-distribution components: Prospects for Trojan-horse attacks
B Nasedkin, F Kiselev, I Filipov, D Tolochko… - Physical Review …, 2023 - APS
Vulnerabilities of components used in quantum-key-distribution systems affect its
implementation security and must be taken into consideration during system development …
implementation security and must be taken into consideration during system development …
Controlling single-photon detector ID210 with bright light
We experimentally demonstrate that a single-photon detector ID210 commercially available
from ID Quantique is vulnerable to blinding and can be fully controlled by bright illumination …
from ID Quantique is vulnerable to blinding and can be fully controlled by bright illumination …
An approach for security evaluation and certification of a complete quantum communication system
Although quantum communication systems are being deployed on a global scale, their
realistic security certification is not yet available. Here we present a security evaluation and …
realistic security certification is not yet available. Here we present a security evaluation and …
Subcarrier wave continuous variable quantum key distribution with discrete modulation: mathematical model and finite-key analysis
In this paper we report a continuous-variable quantum key distribution protocol using
multimode coherent states generated on subcarrier frequencies of the optical spectrum. We …
multimode coherent states generated on subcarrier frequencies of the optical spectrum. We …
Quantum repeaters and teleportation via entangled phase-modulated multimode coherent states
We present a scheme of quantum repeater that uses entangled multimode coherent states
that are obtained by electro-optic modulation of symmetric and antisymmetric Schrödinger …
that are obtained by electro-optic modulation of symmetric and antisymmetric Schrödinger …
Theoretical analysis of quantum key distribution systems when integrated with a DWDM optical transport network
I Vorontsova, R Goncharov, A Tarabrina… - Journal of the Optical …, 2022 - opg.optica.org
Theoretical research and numerical simulation of the noise influence caused by
spontaneous Raman scattering, four-wave mixing, and linear channel cross talk on the …
spontaneous Raman scattering, four-wave mixing, and linear channel cross talk on the …
Feasibility of twin-field quantum key distribution based on multi-mode coherent phase-coded states
In this paper we propose feasibility demonstration of twin-field quantum key ditribution
system based on multi-mode weak coherent phase-coded states. Their utilization provides …
system based on multi-mode weak coherent phase-coded states. Their utilization provides …