Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution

P Jouguet, S Kunz-Jacques, E Diamanti - Physical Review A—Atomic …, 2013 - APS
Establishing an information-theoretic secret key between two parties using a quantum key
distribution (QKD) system is only possible when an accurate characterization of the quantum …

Analysis of imperfections in practical continuous-variable quantum key distribution

P Jouguet, S Kunz-Jacques, E Diamanti… - Physical Review A …, 2012 - APS
As quantum key distribution becomes a mature technology, it appears clearly that some
assumptions made in the security proofs cannot be justified in practical implementations …

[HTML][HTML] Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources

J Gu, XY Cao, Y Fu, ZW He, ZJ Yin, HL Yin, ZB Chen - Science Bulletin, 2022 - Elsevier
The security of quantum key distribution (QKD) is severely threatened by discrepancies
between realistic devices and theoretical assumptions. Recently, a significant framework …

Device calibration impacts security of quantum key distribution

N Jain, C Wittmann, L Lydersen, C Wiechers, D Elser… - Physical Review Letters, 2011 - APS
Characterizing the physical channel and calibrating the cryptosystem hardware are
prerequisites for establishing a quantum channel for quantum key distribution (QKD) …

Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors

H Weier, H Krauss, M Rau, M Fürst… - New Journal of …, 2011 - iopscience.iop.org
The security of quantum key distribution (QKD) can easily be obscured if the eavesdropper
can utilize technical imperfections in the actual implementation. Here, we describe and …

Homodyne-detector-blinding attack in continuous-variable quantum key distribution

H Qin, R Kumar, V Makarov, R Alléaume - Physical Review A, 2018 - APS
We propose an efficient strategy to attack a continuous-variable (CV) quantum key
distribution (QKD) system, which we call homodyne detector blinding. This attack strategy …

Self-referenced continuous-variable quantum key distribution protocol

DBS Soh, C Brif, PJ Coles, N Lütkenhaus… - Physical Review X, 2015 - APS
We introduce a new continuous-variable quantum key distribution (CV-QKD) protocol, self-
referenced CV-QKD, that eliminates the need for transmission of a high-power local …

Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution

H Qin, R Kumar, R Alléaume - Physical Review A, 2016 - APS
We identify and study a security loophole in continuous-variable quantum key distribution
(CVQKD) implementations, related to the imperfect linearity of the homodyne detector. By …

Source attack of decoy-state quantum key distribution using phase information

YL Tang, HL Yin, X Ma, CHF Fung, Y Liu, HL Yong… - Physical Review A …, 2013 - APS
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve
information-theoretically secure key generation. This field is now approaching the stage of …

The security of practical quantum key distribution

V Scarani, H Bechmann-Pasquinucci, NJ Cerf… - Reviews of modern …, 2009 - APS
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …