Quantum key distribution without detector vulnerabilities using optically seeded lasers

LC Comandar, M Lucamarini, B Fröhlich, JF Dynes… - Nature …, 2016 - nature.com
Security in quantum cryptography, is continuously challenged by inventive attacks,,,,
targeting the real components of a cryptographic set-up, and duly restored by new …

Measurement-device-independent quantum key distribution

HK Lo, M Curty, B Qi - Physical review letters, 2012 - APS
How to remove detector side channel attacks has been a notoriously hard problem in
quantum cryptography. Here, we propose a simple solution to this problem—measurement …

Real-World Two-Photon Interference and Proof-of-Principle<? format?> Quantum Key Distribution Immune to Detector Attacks

A Rubenok, JA Slater, P Chan, I Lucio-Martinez… - Physical review …, 2013 - APS
Several vulnerabilities of single-photon detectors have recently been exploited to
compromise the security of quantum-key-distribution (QKD) systems. In this Letter, we report …

Model for optimizing quantum key distribution with continuous-wave pumped entangled-photon sources

SP Neumann, T Scheidl, M Selimovic, M Pivoluska… - Physical review A, 2021 - APS
Quantum key distribution (QKD) allows unconditionally secure communication based on the
laws of quantum mechanics rather than assumptions about computational hardness …

Laser-seeding attack in quantum key distribution

A Huang, Á Navarrete, SH Sun, P Chaiwongkhot… - Physical Review …, 2019 - APS
Quantum key distribution (QKD) based on the laws of quantum physics allows the secure
distribution of secret keys over an insecure channel. Unfortunately, imperfect …

[HTML][HTML] Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources

J Gu, XY Cao, Y Fu, ZW He, ZJ Yin, HL Yin, ZB Chen - Science Bulletin, 2022 - Elsevier
The security of quantum key distribution (QKD) is severely threatened by discrepancies
between realistic devices and theoretical assumptions. Recently, a significant framework …

Hacking commercial quantum cryptography systems by tailored bright illumination

L Lydersen, C Wiechers, C Wittmann, D Elser… - Nature …, 2010 - nature.com
The peculiar properties of quantum mechanics allow two remote parties to communicate a
private, secret key, which is protected from eavesdropping by the laws of physics 1, 2, 3, 4 …

Noisy preprocessing facilitates a photonic realization of device-independent quantum key distribution

M Ho, P Sekatski, EYZ Tan, R Renner, JD Bancal… - Physical review …, 2020 - APS
Device-independent quantum key distribution provides security even when the equipment
used to communicate over the quantum channel is largely uncharacterized. An experimental …

Long-distance decoy-state quantum key distribution in optical fiber

D Rosenberg, JW Harrington, PR Rice, PA Hiskett… - Physical review …, 2007 - APS
The theoretical existence of photon-number-splitting attacks creates a security loophole for
most quantum key distribution (QKD) demonstrations that use a highly attenuated laser …

Gigahertz measurement-device-independent quantum key distribution using directly modulated lasers

RI Woodward, YS Lo, M Pittaluga, M Minder… - npj Quantum …, 2021 - nature.com
Measurement-device-independent quantum key distribution (MDI-QKD) is a technique for
quantum-secured communication that eliminates all detector side-channels, although is …