Full-field implementation of a perfect eavesdropper on a quantum cryptography system

I Gerhardt, Q Liu, A Lamas-Linares, J Skaar… - Nature …, 2011 - nature.com
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its
security is founded on the principles of quantum mechanics, but in reality it significantly …

The security of practical quantum key distribution

V Scarani, H Bechmann-Pasquinucci, NJ Cerf… - Reviews of modern …, 2009 - APS
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …

Quantum key distribution and its applications

M Sasaki - IEEE Security & Privacy, 2018 - ieeexplore.ieee.org
Quantum key distribution (QKD) provides a means to share a secret key between two distant
parties securely against an eavesdropper with unlimited computational ability. QKD …

Overcoming the rate–distance limit of quantum key distribution without quantum repeaters

M Lucamarini, ZL Yuan, JF Dynes, AJ Shields - Nature, 2018 - nature.com
Quantum key distribution (QKD), allows two distant parties to share encryption keys with
security based on physical laws. Experimentally, QKD has been implemented via optical …

Implementation vulnerabilities in general quantum cryptography

A Huang, S Barz, E Andersson… - New Journal of …, 2018 - iopscience.iop.org
Quantum cryptography is information-theoretically secure owing to its solid basis in quantum
mechanics. However, generally, initial implementations with practical imperfections might …

Long-distance quantum key distribution secure against coherent attacks

B Fröhlich, M Lucamarini, JF Dynes, LC Comandar… - Optica, 2017 - opg.optica.org
Quantum key distribution (QKD) permits information-theoretically secure transmission of
digital encryption keys, assuming that the behavior of the devices employed for the key …

Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors

H Weier, H Krauss, M Rau, M Fürst… - New Journal of …, 2011 - iopscience.iop.org
The security of quantum key distribution (QKD) can easily be obscured if the eavesdropper
can utilize technical imperfections in the actual implementation. Here, we describe and …

Practical quantum key distribution protocol without monitoring signal disturbance

T Sasaki, Y Yamamoto, M Koashi - Nature, 2014 - nature.com
Abstract Quantum cryptography,,,,,,, exploits the fundamental laws of quantum mechanics to
provide a secure way to exchange private information. Such an exchange requires a …

An introduction to practical quantum key distribution

O Amer, V Garg, WO Krawec - IEEE Aerospace and Electronic …, 2021 - ieeexplore.ieee.org
Quantum technology, and especially quantum computing, is advancing rapidly. Our every-
day secure communication infrastructure relies heavily on public key cryptography; …

Architecture and protocols of the future European quantum key distribution network

M Dianati, R Alléaume, M Gagnaire… - Security and …, 2008 - Wiley Online Library
A point‐to‐point quantum key distribution (QKD) system takes advantage of the laws of
quantum physics to establish secret keys between two communicating parties. Compared to …