Highly efficient quantum key distribution immune to all detector attacks

WF Cao, YZ Zhen, YL Zheng, ZB Chen, NL Liu… - arXiv preprint arXiv …, 2014 - arxiv.org
Vulnerabilities and imperfections of single-photon detectors have been shown to
compromise security for quantum key distribution (QKD). The measurement-device …

Feasible attack on detector-device-independent quantum key distribution

K Wei, H Liu, H Ma, X Yang, Y Zhang, Y Sun, J Xiao… - Scientific reports, 2017 - nature.com
Recently, to bridge the gap between security of Measurement-device-independent quantum
key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector …

One-sided measurement-device-independent quantum key distribution

WF Cao, YZ Zhen, YL Zheng, L Li, ZB Chen, NL Liu… - Physical Review A, 2018 - APS
Measurement-device-independent quantum key distribution (MDI-QKD) protocol was
proposed to remove all the detector side channel attacks, while its security relies on the …

Robust countermeasure against detector control attack in a practical quantum key distribution system

YJ Qian, DY He, S Wang, W Chen, ZQ Yin, GC Guo… - Optica, 2019 - opg.optica.org
In real-life implementations of quantum key distribution (QKD), the physical systems with
unwanted imperfections would be exploited by an eavesdropper. Based on imperfections in …

Loss-tolerant quantum key distribution with detection efficiency mismatch

A Marcomini, A Mizutani, F Grünenfelder… - arXiv preprint arXiv …, 2024 - arxiv.org
Current implementations of quantum key distribution (QKD) typically rely on prepare-and-
measure (P&M) schemes. Unfortunately, these implementations are not completely secure …

Reference-frame-independent and measurement-device-independent quantum key distribution using one single source

Q Li, C Zhu, S Ma, K Wei, C Pei - International Journal of Theoretical …, 2018 - Springer
Measurement-device-independent quantum key distribution (MDI-QKD) is immune to all
detector side-channel attacks. However, practical implementations of MDI-QKD, which …

Efficient measurement-device-independent quantum key distribution without vacuum sources

XL Hu, ZW Yu, XB Wang - Physical Review A, 2018 - APS
We present an efficient decoy-state protocol measurement-device-independent quantum
key distribution without vacuum source, with the heralded single-photon source (HSPS) and …

Efficient passive measurement-device-independent quantum key distribution

CH Zhang, CM Zhang, Q Wang - Physical Review A, 2019 - APS
To date, only active-decoy-state methods have been adopted in current measurement-
device-independent (MDI) quantum key distribution (QKD) protocols, causing security …

Measurement-device-independent quantum key distribution

HK Lo, M Curty, B Qi - Physical review letters, 2012 - APS
How to remove detector side channel attacks has been a notoriously hard problem in
quantum cryptography. Here, we propose a simple solution to this problem—measurement …

Long distance measurement-device-independent quantum key distribution with entangled photon sources

F Xu, B Qi, Z Liao, HK Lo - Applied physics letters, 2013 - pubs.aip.org
We present a feasible method that can make quantum key distribution (QKD), both ultra-long-
distance and immune, to all attacks in the detection system. This method is called …