Secure quantum key distribution with realistic devices
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …
the laws of physics. In practice, however, the imperfections of realistic devices might …
A review of security evaluation of practical quantum key distribution system
Although the unconditional security of quantum key distribution (QKD) has been widely
studied, the imperfections of the practical devices leave potential loopholes for Eve to spy …
studied, the imperfections of the practical devices leave potential loopholes for Eve to spy …
Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits
We perform a proof-of-principle demonstration of the measurement-device-independent
quantum key distribution protocol using weak coherent states and polarization-encoded …
quantum key distribution protocol using weak coherent states and polarization-encoded …
Device calibration impacts security of quantum key distribution
Characterizing the physical channel and calibrating the cryptosystem hardware are
prerequisites for establishing a quantum channel for quantum key distribution (QKD) …
prerequisites for establishing a quantum channel for quantum key distribution (QKD) …
Conclusive quantum steering with superconducting transition-edge sensors
Quantum steering allows two parties to verify shared entanglement even if one
measurement device is untrusted. A conclusive demonstration of steering through the …
measurement device is untrusted. A conclusive demonstration of steering through the …
Trojan-horse attacks threaten the security of practical quantum cryptography
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by
sending in bright light from the quantum channel and analyzing the backreflections. We …
sending in bright light from the quantum channel and analyzing the backreflections. We …
Risk analysis of Trojan-horse attacks on practical quantum key distribution systems
An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a
bright pulse from the quantum channel into the system and analyzing the back-reflected …
bright pulse from the quantum channel into the system and analyzing the back-reflected …
Laser-seeding attack in quantum key distribution
Quantum key distribution (QKD) based on the laws of quantum physics allows the secure
distribution of secret keys over an insecure channel. Unfortunately, imperfect …
distribution of secret keys over an insecure channel. Unfortunately, imperfect …
Laser-damage attack against optical attenuators in quantum key distribution
Many quantum key distribution systems employ a laser followed by an optical attenuator to
prepare weak coherent states in the source. Their mean photon number must be …
prepare weak coherent states in the source. Their mean photon number must be …
Laser damage helps the eavesdropper in quantum cryptography
AN Bugge, S Sauge, AMM Ghazali, J Skaar… - Physical review …, 2014 - APS
We propose a class of attacks on quantum key distribution (QKD) systems where an
eavesdropper actively engineers new loopholes by using damaging laser illumination to …
eavesdropper actively engineers new loopholes by using damaging laser illumination to …