Secure quantum key distribution with realistic devices

F Xu, X Ma, Q Zhang, HK Lo, JW Pan - Reviews of modern physics, 2020 - APS
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …

A review of security evaluation of practical quantum key distribution system

S Sun, A Huang - Entropy, 2022 - mdpi.com
Although the unconditional security of quantum key distribution (QKD) has been widely
studied, the imperfections of the practical devices leave potential loopholes for Eve to spy …

Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits

T Ferreira da Silva, D Vitoreti, GB Xavier… - Physical Review A …, 2013 - APS
We perform a proof-of-principle demonstration of the measurement-device-independent
quantum key distribution protocol using weak coherent states and polarization-encoded …

Device calibration impacts security of quantum key distribution

N Jain, C Wittmann, L Lydersen, C Wiechers, D Elser… - Physical Review Letters, 2011 - APS
Characterizing the physical channel and calibrating the cryptosystem hardware are
prerequisites for establishing a quantum channel for quantum key distribution (QKD) …

Conclusive quantum steering with superconducting transition-edge sensors

DH Smith, G Gillett, MP De Almeida, C Branciard… - Nature …, 2012 - nature.com
Quantum steering allows two parties to verify shared entanglement even if one
measurement device is untrusted. A conclusive demonstration of steering through the …

Trojan-horse attacks threaten the security of practical quantum cryptography

N Jain, E Anisimova, I Khan, V Makarov… - New Journal of …, 2014 - iopscience.iop.org
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by
sending in bright light from the quantum channel and analyzing the backreflections. We …

Risk analysis of Trojan-horse attacks on practical quantum key distribution systems

N Jain, B Stiller, I Khan, V Makarov… - IEEE Journal of …, 2014 - ieeexplore.ieee.org
An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a
bright pulse from the quantum channel into the system and analyzing the back-reflected …

Laser-seeding attack in quantum key distribution

A Huang, Á Navarrete, SH Sun, P Chaiwongkhot… - Physical Review …, 2019 - APS
Quantum key distribution (QKD) based on the laws of quantum physics allows the secure
distribution of secret keys over an insecure channel. Unfortunately, imperfect …

Laser-damage attack against optical attenuators in quantum key distribution

A Huang, R Li, V Egorov, S Tchouragoulov, K Kumar… - Physical Review …, 2020 - APS
Many quantum key distribution systems employ a laser followed by an optical attenuator to
prepare weak coherent states in the source. Their mean photon number must be …

Laser damage helps the eavesdropper in quantum cryptography

AN Bugge, S Sauge, AMM Ghazali, J Skaar… - Physical review …, 2014 - APS
We propose a class of attacks on quantum key distribution (QKD) systems where an
eavesdropper actively engineers new loopholes by using damaging laser illumination to …