Feasible attack on detector-device-independent quantum key distribution

K Wei, H Liu, H Ma, X Yang, Y Zhang, Y Sun, J Xiao… - Scientific reports, 2017 - nature.com
Recently, to bridge the gap between security of Measurement-device-independent quantum
key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector …

One-sided measurement-device-independent quantum key distribution

WF Cao, YZ Zhen, YL Zheng, L Li, ZB Chen, NL Liu… - Physical Review A, 2018 - APS
Measurement-device-independent quantum key distribution (MDI-QKD) protocol was
proposed to remove all the detector side channel attacks, while its security relies on the …

Polarization-encoding-based measurement-device-independent quantum key distribution with a single untrusted source

CQ Liu, CH Zhu, LH Wang, LX Zhang… - Chinese Physics …, 2016 - iopscience.iop.org
Measurement-device-independent quantum key distribution (MDI-QKD) can be immune to
all detector side-channel attacks and guarantee the information-theoretical security even …

Simple implementation of quantum key distribution based on single-photon Bell-state measurement

WY Liang, M Li, ZQ Yin, W Chen, S Wang, XB An… - Physical Review A, 2015 - APS
Recently some alternatives to the measurement-device-independent (MDI) quantum key
distribution (QKD) based on the single-photon Bell-state measurement (SBSM) were …

Monitoring an untrusted light source with single-photon detectors in measurement-device-independent quantum key distribution

Y Qiao, G Wang, Z Li, B Xu, H Guo - Physical Review A, 2019 - APS
Measurement-device-independent quantum key distribution (MDI-QKD) is proposed to close
the loopholes of the detection part in QKD systems, while it still requires the light source to …

Trustworthiness of detectors in quantum key distribution with untrusted detectors

B Qi - Physical Review A, 2015 - APS
Measurement-device-independent quantum key distribution (MDI-QKD) protocol has been
demonstrated as a viable solution to detector side-channel attacks. Recently, to bridge the …

Highly efficient quantum key distribution immune to all detector attacks

WF Cao, YZ Zhen, YL Zheng, ZB Chen, NL Liu… - arXiv preprint arXiv …, 2014 - arxiv.org
Vulnerabilities and imperfections of single-photon detectors have been shown to
compromise security for quantum key distribution (QKD). The measurement-device …

Polarization-based plug-and-play measurement-device-independent quantum key distribution

M Hu, L Zhang, B Guo, J Li - Optical and Quantum Electronics, 2019 - Springer
Measurement-device-independent quantum key distribution (MDI-QKD) has received much
attention, with the goal of overcoming all of the security loopholes caused by an imperfect …

Measurement-device-independent quantum key distribution with a passive decoy-state method

YZ Shan, SH Sun, XC Ma, MS Jiang, YL Zhou… - Physical Review A, 2014 - APS
Measurement-device-independent quantum key distribution (MDI-QKD) can remove all
detector loopholes. When it is combined with the decoy-state method, the final key is …

Efficient passive measurement-device-independent quantum key distribution

CH Zhang, CM Zhang, Q Wang - Physical Review A, 2019 - APS
To date, only active-decoy-state methods have been adopted in current measurement-
device-independent (MDI) quantum key distribution (QKD) protocols, causing security …