Simulating all quantum measurements using only projective measurements and postselection

M Oszmaniec, FB Maciejewski, Z Puchała - Physical Review A, 2019 - APS
We report an alternative scheme for implementing generalized quantum measurements that
does not require the usage of an auxiliary system. Our method utilizes solely (a) classical …

Continuous variable B92 quantum key distribution protocol using single photon added and subtracted coherent states

S Srikara, K Thapliyal, A Pathak - Quantum Information Processing, 2020 - Springer
In this paper, a continuous variable B92 quantum key distribution protocol is proposed using
single photon added and subtracted coherent states, which are prepared by adding and …

Methods of decreasing the unambiguous state discrimination probability for subcarrier wave quantum key distribution systems

A Gaidash, A Kozubov, G Miroshnichenko - JOSA B, 2019 - opg.optica.org
In this paper, we compare two solutions (well known and newly proposed) for subcarrier
wave quantum key distribution systems that decrease the crucial impact of the errorless …

Countermeasures for advanced unambiguous state discrimination attack on quantum key distribution protocol based on weak coherent states

A Gaidash, A Kozubov, G Miroshnichenko - Physica Scripta, 2019 - iopscience.iop.org
In this paper we investigate the advanced unambiguous state discrimination (USD) attack
that is crucial for quantum key distribution based on phase-coded coherent states …

A generalized framework for quantum state discrimination, hybrid algorithms, and the quantum change point problem

A Mohan, J Sikora, S Upadhyay - arXiv preprint arXiv:2312.04023, 2023 - arxiv.org
Quantum state discrimination is a central task in many quantum computing settings where
one wishes to identify what quantum state they are holding. We introduce a framework that …

Practical security of semi-quantum key distribution

WO Krawec - Quantum Information Science, Sensing, and …, 2018 - spiedigitallibrary.org
Unconditionally secure key distribution is impossible using classical communication only.
However, by providing Alice and Bob with quantum capable hardware the task becomes …

Interactive simulation of quantum key distribution protocols and application in Wi-Fi networks

D Escanez-Exposito, P Caballero-Gil… - Wireless …, 2023 - Springer
Key distribution allows two parties to produce and share a random secret key, which can
then be used to encrypt and decrypt messages with symmetric cryptosystems. Thus, this is …

Subcarrier wave quantum key distribution with leaky and flawed devices

A Gaidash, G Miroshnichenko, A Kozubov - JOSA B, 2022 - opg.optica.org
In this paper, we consider the influence of device imperfections on the performance of the
subcarrier wave quantum key distribution system. For instance, we consider the utilization of …

Photon Number Splitting Attack–Proposal and Analysis of an Experimental Scheme

A Ashkenazy, Y Idan, D Korn, D Fixler… - Advanced Quantum …, 2024 - Wiley Online Library
Abstract Photon‐number‐splitting (PNS) is a well‐known theoretical attack on quantum key
distribution (QKD) protocols that employ weak coherent states produced by attenuated laser …

Quantum control attack: Towards joint estimation of protocol and hardware loopholes

A Kozubov, A Gaidash, G Miroshnichenko - Physical Review A, 2021 - APS
In this paper we present the approach for description of quantum control attack based on
combined protocol and hardware loopholes. It consolidates intercept-resend attack and …