Full-field implementation of a perfect eavesdropper on a quantum cryptography system
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its
security is founded on the principles of quantum mechanics, but in reality it significantly …
security is founded on the principles of quantum mechanics, but in reality it significantly …
Long-term performance of the SwissQuantum quantum key distribution network in a field environment
D Stucki, M Legre, F Buntschu, B Clausen… - New Journal of …, 2011 - iopscience.iop.org
In this paper, we report on the performance of the SwissQuantum quantum key distribution
(QKD) network. The network was installed in the Geneva metropolitan area and ran for more …
(QKD) network. The network was installed in the Geneva metropolitan area and ran for more …
Device calibration impacts security of quantum key distribution
Characterizing the physical channel and calibrating the cryptosystem hardware are
prerequisites for establishing a quantum channel for quantum key distribution (QKD) …
prerequisites for establishing a quantum channel for quantum key distribution (QKD) …
True random number generators
M Stipčević, ÇK Koç - Open problems in mathematics and computational …, 2014 - Springer
Random numbers are needed in many areas: cryptography, Monte Carlo computation and
simulation, industrial testing and labeling, hazard games, gambling, etc. Our assumption has …
simulation, industrial testing and labeling, hazard games, gambling, etc. Our assumption has …
Quantum randomness certified by the uncertainty principle
We present an efficient method to extract the amount of true randomness that can be
obtained by a quantum random number generator (QRNG). By repeating the measurements …
obtained by a quantum random number generator (QRNG). By repeating the measurements …
Laser damage helps the eavesdropper in quantum cryptography
AN Bugge, S Sauge, AMM Ghazali, J Skaar… - Physical review …, 2014 - APS
We propose a class of attacks on quantum key distribution (QKD) systems where an
eavesdropper actively engineers new loopholes by using damaging laser illumination to …
eavesdropper actively engineers new loopholes by using damaging laser illumination to …
Attacks on practical quantum key distribution systems (and how to prevent them)
With the emergence of an information society, the idea of protecting sensitive data is steadily
gaining importance. Conventional encryption methods may not be sufficient to guarantee …
gaining importance. Conventional encryption methods may not be sufficient to guarantee …
Controlling a superconducting nanowire single-photon detector using tailored bright illumination
We experimentally demonstrate that a superconducting nanowire single-photon detector is
deterministically controllable by bright illumination. We found that bright light can temporarily …
deterministically controllable by bright illumination. We found that bright light can temporarily …
Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography
Semiconductor avalanche photodiodes (APDs) are commonly used for single photon
detection in quantum key distribution. Recently, many attacks using bright illumination have …
detection in quantum key distribution. Recently, many attacks using bright illumination have …
Creation of backdoors in quantum communications via laser damage
V Makarov, JP Bourgoin, P Chaiwongkhot, M Gagné… - Physical Review A, 2016 - APS
Practical quantum communication (QC) protocols are assumed to be secure provided
implemented devices are properly characterized and all known side channels are closed …
implemented devices are properly characterized and all known side channels are closed …