Safeguarding quantum key distribution through detection randomization

TF da Silva, GC do Amaral, GB Xavier… - IEEE Journal of …, 2014 - ieeexplore.ieee.org
We propose and experimentally demonstrate a scheme to render the detection apparatus of
a quantum key distribution system immune to the main classes of hacking attacks in which …

Quantum hacking on quantum key distribution using homodyne detection

JZ Huang, S Kunz-Jacques, P Jouguet, C Weedbrook… - Physical Review A, 2014 - APS
Imperfect devices in commercial quantum key distribution systems open security loopholes
that an eavesdropper may exploit. An example of one such imperfection is the wavelength …

Robust countermeasure against detector control attack in a practical quantum key distribution system: comment

Z Wu, A Huang, X Qiang, J Ding, P Xu, X Fu, J Wu - Optica, 2020 - opg.optica.org
The physical imperfections of quantum key distribution systems compromise their
information-theoretic security. By exploiting the imperfections on the detection unit, an …

Noisy preprocessing facilitates a photonic realization of device-independent quantum key distribution

M Ho, P Sekatski, EYZ Tan, R Renner, JD Bancal… - Physical review …, 2020 - APS
Device-independent quantum key distribution provides security even when the equipment
used to communicate over the quantum channel is largely uncharacterized. An experimental …

Automated verification of countermeasure against detector-control attack in quantum key distribution

P Acheva, K Zaitsev, V Zavodilenko, A Losev… - EPJ Quantum …, 2023 - epjqt.epj.org
Attacks that control single-photon detectors in quantum key distribution using tailored bright
illumination are capable of eavesdropping the secret key. Here we report an automated …

Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors

H Weier, H Krauss, M Rau, M Fürst… - New Journal of …, 2011 - iopscience.iop.org
The security of quantum key distribution (QKD) can easily be obscured if the eavesdropper
can utilize technical imperfections in the actual implementation. Here, we describe and …

Randomized ancillary qubit overcomes detector-control and intercept-resend hacking of quantum key distribution

SF Hegazy, SSA Obayya… - Journal of Lightwave …, 2022 - ieeexplore.ieee.org
Practical implementations of quantum key distribution (QKD) have been shown to be subject
to various detector side-channel attacks that compromise the promised unconditional …

Robust countermeasure against detector control attack in a practical quantum key distribution system

YJ Qian, DY He, S Wang, W Chen, ZQ Yin, GC Guo… - Optica, 2019 - opg.optica.org
In real-life implementations of quantum key distribution (QKD), the physical systems with
unwanted imperfections would be exploited by an eavesdropper. Based on imperfections in …

Secure gated detection scheme for quantum cryptography

L Lydersen, V Makarov, J Skaar - Physical Review A—Atomic, Molecular, and …, 2011 - APS
Several attacks have been proposed on quantum key distribution systems with gated single-
photon detectors. The attacks involve triggering the detectors outside the center of the …

Quantum key distribution using continuous-variable non-Gaussian states

LFM Borelli, LS Aguiar, JA Roversi… - Quantum information …, 2016 - Springer
In this work, we present a quantum key distribution protocol using continuous-variable non-
Gaussian states, homodyne detection and post-selection. The employed signal states are …