Automated verification of countermeasure against detector-control attack in quantum key distribution

P Acheva, K Zaitsev, V Zavodilenko, A Losev… - EPJ Quantum …, 2023 - epjqt.epj.org
Attacks that control single-photon detectors in quantum key distribution using tailored bright
illumination are capable of eavesdropping the secret key. Here we report an automated …

Safeguarding quantum key distribution through detection randomization

TF da Silva, GC do Amaral, GB Xavier… - IEEE Journal of …, 2014 - ieeexplore.ieee.org
We propose and experimentally demonstrate a scheme to render the detection apparatus of
a quantum key distribution system immune to the main classes of hacking attacks in which …

Highly efficient quantum key distribution immune to all detector attacks

WF Cao, YZ Zhen, YL Zheng, ZB Chen, NL Liu… - arXiv preprint arXiv …, 2014 - arxiv.org
Vulnerabilities and imperfections of single-photon detectors have been shown to
compromise security for quantum key distribution (QKD). The measurement-device …

Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing

S Sajeed, I Radchenko, S Kaiser, JP Bourgoin… - Physical Review A, 2015 - APS
The security of quantum communication using a weak coherent source requires an accurate
knowledge of the source's mean photon number. Finite calibration precision or an active …

Feasible attack on detector-device-independent quantum key distribution

K Wei, H Liu, H Ma, X Yang, Y Zhang, Y Sun, J Xiao… - Scientific reports, 2017 - nature.com
Recently, to bridge the gap between security of Measurement-device-independent quantum
key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector …

Secure gated detection scheme for quantum cryptography

L Lydersen, V Makarov, J Skaar - Physical Review A—Atomic, Molecular, and …, 2011 - APS
Several attacks have been proposed on quantum key distribution systems with gated single-
photon detectors. The attacks involve triggering the detectors outside the center of the …

Robust countermeasure against detector control attack in a practical quantum key distribution system

YJ Qian, DY He, S Wang, W Chen, ZQ Yin, GC Guo… - Optica, 2019 - opg.optica.org
In real-life implementations of quantum key distribution (QKD), the physical systems with
unwanted imperfections would be exploited by an eavesdropper. Based on imperfections in …

Robust countermeasure against detector control attack in a practical quantum key distribution system: comment

Z Wu, A Huang, X Qiang, J Ding, P Xu, X Fu, J Wu - Optica, 2020 - opg.optica.org
The physical imperfections of quantum key distribution systems compromise their
information-theoretic security. By exploiting the imperfections on the detection unit, an …

Hacking commercial quantum cryptography systems by tailored bright illumination

L Lydersen, C Wiechers, C Wittmann, D Elser… - Nature …, 2010 - nature.com
The peculiar properties of quantum mechanics allow two remote parties to communicate a
private, secret key, which is protected from eavesdropping by the laws of physics 1, 2, 3, 4 …

Intensity modulation as a preemptive measure against blinding of single-photon detectors based on self-differencing cancellation

A Koehler-Sidki, M Lucamarini, JF Dynes, GL Roberts… - Physical Review A, 2018 - APS
Quantum key distribution is rising as an important cryptographic primitive for protecting the
communication infrastructure in the digital era. However, its implementation security is often …