Hacking measurement-device-independent quantum key distribution
Decoy-state measurement-device-independent quantum key distribution (MDI-QKD) is
regarded as one of the most promising protocols since it is physically immune to all fatal …
regarded as one of the most promising protocols since it is physically immune to all fatal …
Induced-photorefraction attack against quantum key distribution
Abstract Lithium niobate (Li Nb O 3, LN) devices play critical roles in quantum information
processing. However, for special applications like quantum key distribution (QKD), the …
processing. However, for special applications like quantum key distribution (QKD), the …
Automated verification of countermeasure against detector-control attack in quantum key distribution
Attacks that control single-photon detectors in quantum key distribution using tailored bright
illumination are capable of eavesdropping the secret key. Here we report an automated …
illumination are capable of eavesdropping the secret key. Here we report an automated …
A fully passive transmitter for decoy-state quantum key distribution
A passive quantum key distribution (QKD) transmitter generates the quantum states
prescribed by a QKD protocol at random, combining a fixed quantum mechanism and a post …
prescribed by a QKD protocol at random, combining a fixed quantum mechanism and a post …
Effect of light injection on the security of practical quantum key distribution
Quantum key distribution (QKD) based on the fundamental laws of quantum physics can
allow the distribution of secure keys between distant users. However, imperfections in …
allow the distribution of secure keys between distant users. However, imperfections in …
Characterization of state-preparation uncertainty in quantum key distribution
To achieve secure quantum key distribution, all imperfections in the source unit must be
incorporated in a security proof and measured in the lab. Here we perform a proof-of …
incorporated in a security proof and measured in the lab. Here we perform a proof-of …
Implementation security in quantum key distribution
The problem of implementation security in quantum key distribution (QKD) refers to the
difficulty of meeting the requirements of mathematical security proofs in real‐life QKD …
difficulty of meeting the requirements of mathematical security proofs in real‐life QKD …
Quantified effects of the laser-seeding attack in quantum key distribution
Quantum key distribution (QKD) enables private communications with information-theoretic
security. To guarantee the practical security of QKD, it is essential that QKD systems are …
security. To guarantee the practical security of QKD, it is essential that QKD systems are …
Loopholes in the 1500–2100-nm Range for Quantum-Key-Distribution Components: Prospects for Trojan-Horse Attacks
B Nasedkin, F Kiselev, I Filipov, D Tolochko… - Physical Review …, 2023 - APS
Vulnerabilities of components used in quantum-key-distribution systems affect its
implementation security and must be taken into consideration during system development …
implementation security and must be taken into consideration during system development …
Security analysis against the Trojan horse attack on practical polarization-encoding quantum key distribution systems
T Luo, Q Liu, X Sun, C Huang, Y Chen, Z Zhang, K Wei - Physical Review A, 2024 - APS
Quantum key distribution (QKD), which theoretically provides unconditional secure
communication, has developed rapidly in the past decades. However, the practical QKD …
communication, has developed rapidly in the past decades. However, the practical QKD …