Quantum key distribution with untrusted detectors

P González, L Rebón, T Ferreira da Silva, M Figueroa… - Physical Review A, 2015 - APS
Side-channel attacks currently constitute the main challenge for quantum key distribution
(QKD) to bridge theory with practice. So far two main approaches have been introduced to …

Security proof of practical quantum key distribution with detection-efficiency mismatch

Y Zhang, PJ Coles, A Winick, J Lin, N Lütkenhaus - Physical Review Research, 2021 - APS
Quantum key distribution (QKD) protocols with threshold detectors are driving high-
performance QKD demonstrations. The corresponding security proofs usually assume that …

Insecurity of detector-device-independent quantum key distribution

S Sajeed, A Huang, S Sun, F Xu, V Makarov, M Curty - Physical review letters, 2016 - APS
Detector-device-independent quantum key distribution (DDI-QKD) held the promise of being
robust to detector side channels, a major security loophole in quantum key distribution …

Experimental measurement-device-independent quantum key distribution with imperfect sources

Z Tang, K Wei, O Bedroya, L Qian, HK Lo - Physical Review A, 2016 - APS
Measurement-device-independent quantum key distribution (MDI-QKD), which is immune to
all detector side-channel attacks, is the most promising solution to the security issues in …

Practical quantum key distribution that is secure against side channels

Á Navarrete, M Pereira, M Curty, K Tamaki - Physical Review Applied, 2021 - APS
There is a large gap between theory and practice in quantum key distribution (QKD)
because real devices do not satisfy the assumptions required by the security proofs. Here …

Detector-device-independent quantum key distribution

CCW Lim, B Korzh, A Martin, F Bussieres… - Applied Physics …, 2014 - pubs.aip.org
Recently, a quantum key distribution (QKD) scheme based on entanglement swapping,
called measurement-device-independent QKD (mdiQKD), was proposed to bypass all …

Random variation of detector efficiency: A countermeasure against detector blinding attacks for quantum key distribution

CCW Lim, N Walenta, M Legré, N Gisin… - IEEE Journal of …, 2015 - ieeexplore.ieee.org
In the recent decade, it has been discovered that QKD systems are extremely vulnerable to
side-channel attacks. In particular, by exploiting the internal working knowledge of practical …

Source attack of decoy-state quantum key distribution using phase information

YL Tang, HL Yin, X Ma, CHF Fung, Y Liu, HL Yong… - Physical Review A …, 2013 - APS
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve
information-theoretically secure key generation. This field is now approaching the stage of …

Trustworthiness of detectors in quantum key distribution with untrusted detectors

B Qi - Physical Review A, 2015 - APS
Measurement-device-independent quantum key distribution (MDI-QKD) protocol has been
demonstrated as a viable solution to detector side-channel attacks. Recently, to bridge the …

Quantum Key Distribution with Basis-Dependent Detection Probability

F Grasselli, G Chesi, N Walk, H Kampermann… - arXiv preprint arXiv …, 2024 - arxiv.org
Quantum Key Distribution (QKD) is a promising technology for secure communication.
Nevertheless, QKD is still treated with caution in certain contexts due to potential gaps …