Quantum key distribution with dual detectors

B Qi, Y Zhao, X Ma, HK Lo, L Qian - … Review A—Atomic, Molecular, and Optical …, 2007 - APS
To improve the performance of a quantum-key-distribution (QKD) system, high speed, low
dark count single photon detectors (or low-noise homodyne detectors) are required …

Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors

H Weier, H Krauss, M Rau, M Fürst… - New Journal of …, 2011 - iopscience.iop.org
The security of quantum key distribution (QKD) can easily be obscured if the eavesdropper
can utilize technical imperfections in the actual implementation. Here, we describe and …

A novel quantum key distribution resistant against large‐pulse attacks

K Karabo, C Sekga, C Kissack, M Mafu… - IET Quantum …, 2024 - Wiley Online Library
Quantum key distribution (QKD) offers information‐theoretic security by leveraging the
principles of quantum mechanics. This means the security is independent of all future …

Security proof of practical quantum key distribution with detection-efficiency mismatch

Y Zhang, PJ Coles, A Winick, J Lin, N Lütkenhaus - Physical Review Research, 2021 - APS
Quantum key distribution (QKD) protocols with threshold detectors are driving high-
performance QKD demonstrations. The corresponding security proofs usually assume that …

Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources

Q Wang, XB Wang - Physical Review A—Atomic, Molecular, and Optical …, 2013 - APS
We study decoy-state measurement-device-independent quantum key distribution using
heralded single-photon sources. This has the advantage that the observed error rate in the X …

Experimental quantum key distribution with decoy states

Y Zhao, B Qi, X Ma, HK Lo, L Qian - Physical review letters, 2006 - APS
To increase dramatically the distance and the secure key generation rate of quantum key
distribution (QKD), the idea of quantum decoys—signals of different intensities—has recently …

Quantum key distribution with passive decoy state selection

W Mauerer, C Silberhorn - Physical Review A—Atomic, Molecular, and Optical …, 2007 - APS
We propose a quantum key distribution scheme which closely matches the performance of a
perfect single photon source. It nearly attains the physical upper bound in terms of key …

Robust unconditionally secure quantum key distribution with two nonorthogonal and uninformative states

M Lucamarini, G Di Giuseppe, K Tamaki - Physical Review A—Atomic …, 2009 - APS
We present an unconventional form of decoy-state technique to make the single-photon
Bennett 1992 protocol robust against losses and noise of a communication channel. Two …

Practical aspects of measurement-device-independent quantum key distribution

F Xu, M Curty, B Qi, HK Lo - New Journal of Physics, 2013 - iopscience.iop.org
A novel protocol, measurement-device-independent quantum key distribution (MDI-QKD),
removes all attacks from the detection system, the most vulnerable part in QKD …

Upper bounds for the secure key rate of the decoy-state quantum key distribution

M Curty, T Moroder, X Ma, HK Lo, N Lütkenhaus - Physical Review A—Atomic …, 2009 - APS
The use of decoy states in quantum key distribution (QKD) has provided a method for
substantially increasing the secret key rate and distance that can be covered by QKD …