Hacking measurement-device-independent quantum key distribution

FY Lu, P Ye, ZH Wang, S Wang, ZQ Yin, R Wang… - Optica, 2023 - opg.optica.org
Decoy-state measurement-device-independent quantum key distribution (MDI-QKD) is
regarded as one of the most promising protocols since it is physically immune to all fatal …

Induced-photorefraction attack against quantum key distribution

P Ye, W Chen, GW Zhang, FY Lu, FX Wang… - Physical Review …, 2023 - APS
Abstract Lithium niobate (Li Nb O 3, LN) devices play critical roles in quantum information
processing. However, for special applications like quantum key distribution (QKD), the …

Automated verification of countermeasure against detector-control attack in quantum key distribution

P Acheva, K Zaitsev, V Zavodilenko, A Losev… - EPJ Quantum …, 2023 - epjqt.epj.org
Attacks that control single-photon detectors in quantum key distribution using tailored bright
illumination are capable of eavesdropping the secret key. Here we report an automated …

A fully passive transmitter for decoy-state quantum key distribution

V Zapatero, W Wang, M Curty - Quantum Science and …, 2023 - iopscience.iop.org
A passive quantum key distribution (QKD) transmitter generates the quantum states
prescribed by a QKD protocol at random, combining a fixed quantum mechanism and a post …

Effect of light injection on the security of practical quantum key distribution

L Han, Y Li, H Tan, W Zhang, W Cai, J Yin, J Ren… - Physical Review …, 2023 - APS
Quantum key distribution (QKD) based on the fundamental laws of quantum physics can
allow the distribution of secure keys between distant users. However, imperfections in …

Characterization of state-preparation uncertainty in quantum key distribution

A Huang, A Mizutani, HK Lo, V Makarov, K Tamaki - Physical Review Applied, 2023 - APS
To achieve secure quantum key distribution, all imperfections in the source unit must be
incorporated in a security proof and measured in the lab. Here we perform a proof-of …

Implementation security in quantum key distribution

V Zapatero, Á Navarrete, M Curty - Advanced Quantum …, 2024 - Wiley Online Library
The problem of implementation security in quantum key distribution (QKD) refers to the
difficulty of meeting the requirements of mathematical security proofs in real‐life QKD …

Quantified effects of the laser-seeding attack in quantum key distribution

V Lovic, DG Marangon, PR Smith, RI Woodward… - Physical Review …, 2023 - APS
Quantum key distribution (QKD) enables private communications with information-theoretic
security. To guarantee the practical security of QKD, it is essential that QKD systems are …

Loopholes in the 1500–2100-nm Range for Quantum-Key-Distribution Components: Prospects for Trojan-Horse Attacks

B Nasedkin, F Kiselev, I Filipov, D Tolochko… - Physical Review …, 2023 - APS
Vulnerabilities of components used in quantum-key-distribution systems affect its
implementation security and must be taken into consideration during system development …

Security analysis against the Trojan horse attack on practical polarization-encoding quantum key distribution systems

T Luo, Q Liu, X Sun, C Huang, Y Chen, Z Zhang, K Wei - Physical Review A, 2024 - APS
Quantum key distribution (QKD), which theoretically provides unconditional secure
communication, has developed rapidly in the past decades. However, the practical QKD …