Secure quantum key distribution with realistic devices

F Xu, X Ma, Q Zhang, HK Lo, JW Pan - Reviews of modern physics, 2020 - APS
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …

[HTML][HTML] Supercomputers and quantum computing on the axis of cyber security

H Yalcin, T Daim, MM Moughari, A Mermoud - Technology in Society, 2024 - Elsevier
Cybersecurity has become a very critical area to address for governments, industry and the
academic community. Cyber attacks are on the rise so is research to address the challenges …

Full-field implementation of a perfect eavesdropper on a quantum cryptography system

I Gerhardt, Q Liu, A Lamas-Linares, J Skaar… - Nature …, 2011 - nature.com
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its
security is founded on the principles of quantum mechanics, but in reality it significantly …

Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack

JZ Huang, C Weedbrook, ZQ Yin, S Wang, HW Li… - Physical Review A …, 2013 - APS
The security proofs of continuous-variable quantum key distribution are based on the
assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's …

Long-distance quantum key distribution secure against coherent attacks

B Fröhlich, M Lucamarini, JF Dynes, LC Comandar… - Optica, 2017 - opg.optica.org
Quantum key distribution (QKD) permits information-theoretically secure transmission of
digital encryption keys, assuming that the behavior of the devices employed for the key …

Alternative schemes for measurement-device-independent quantum key distribution

X Ma, M Razavi - Physical Review A—Atomic, Molecular, and Optical …, 2012 - APS
Practical schemes for measurement-device-independent quantum key distribution using
phase and path or time encoding are presented. In addition to immunity to existing …

A review of security evaluation of practical quantum key distribution system

S Sun, A Huang - Entropy, 2022 - mdpi.com
Although the unconditional security of quantum key distribution (QKD) has been widely
studied, the imperfections of the practical devices leave potential loopholes for Eve to spy …

Device calibration impacts security of quantum key distribution

N Jain, C Wittmann, L Lydersen, C Wiechers, D Elser… - Physical Review Letters, 2011 - APS
Characterizing the physical channel and calibrating the cryptosystem hardware are
prerequisites for establishing a quantum channel for quantum key distribution (QKD) …

Quantum eavesdrop** without interception: an attack exploiting the dead time of single-photon detectors

H Weier, H Krauss, M Rau, M Fürst… - New Journal of …, 2011 - iopscience.iop.org
The security of quantum key distribution (QKD) can easily be obscured if the eavesdropper
can utilize technical imperfections in the actual implementation. Here, we describe and …

Implementation security in quantum key distribution

V Zapatero, Á Navarrete, M Curty - Advanced Quantum …, 2024 - Wiley Online Library
The problem of implementation security in quantum key distribution (QKD) refers to the
difficulty of meeting the requirements of mathematical security proofs in real‐life QKD …