Advances in quantum cryptography

S Pirandola, UL Andersen, L Banchi… - Advances in optics …, 2020 - opg.optica.org
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …

Robust and adaptable quantum key distribution network without trusted nodes

GJ Fan-Yuan, FY Lu, S Wang, ZQ Yin, DY He, W Chen… - Optica, 2022 - opg.optica.org
Quantum key distribution (QKD) networks are promising to serve large numbers of users
with information-theoretic secure communication. In QKD networks, the detection-safe …

Real-World Two-Photon Interference and Proof-of-Principle<? format?> Quantum Key Distribution Immune to Detector Attacks

A Rubenok, JA Slater, P Chan, I Lucio-Martinez… - Physical review …, 2013 - APS
Several vulnerabilities of single-photon detectors have recently been exploited to
compromise the security of quantum-key-distribution (QKD) systems. In this Letter, we report …

Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack

JZ Huang, C Weedbrook, ZQ Yin, S Wang, HW Li… - Physical Review A …, 2013 - APS
The security proofs of continuous-variable quantum key distribution are based on the
assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's …

Device calibration impacts security of quantum key distribution

N Jain, C Wittmann, L Lydersen, C Wiechers, D Elser… - Physical Review Letters, 2011 - APS
Characterizing the physical channel and calibrating the cryptosystem hardware are
prerequisites for establishing a quantum channel for quantum key distribution (QKD) …

Laser-seeding attack in quantum key distribution

A Huang, Á Navarrete, SH Sun, P Chaiwongkhot… - Physical Review …, 2019 - APS
Quantum key distribution (QKD) based on the laws of quantum physics allows the secure
distribution of secret keys over an insecure channel. Unfortunately, imperfect …

Laser-damage attack against optical attenuators in quantum key distribution

A Huang, R Li, V Egorov, S Tchouragoulov, K Kumar… - Physical Review …, 2020 - APS
Many quantum key distribution systems employ a laser followed by an optical attenuator to
prepare weak coherent states in the source. Their mean photon number must be …

Comments on the Generalized KJLN Key Exchanger with Arbitrary Resistors: Power, Impedance, Security

S Ferdous, C Chamon, LB Kish - Fluctuation and Noise Letters, 2021 - World Scientific
In (Nature) Science Report 5 (2015) 13653, Vadai, Mingesz and Gingl (VMG) introduce a
new Kirchhoff-law-Johnson-noise (KLJN) secure key exchanger that operates with 4 …

Attacks on practical quantum key distribution systems (and how to prevent them)

N Jain, B Stiller, I Khan, D Elser, C Marquardt… - Contemporary …, 2016 - Taylor & Francis
With the emergence of an information society, the idea of protecting sensitive data is steadily
gaining importance. Conventional encryption methods may not be sufficient to guarantee …

Deployed measurement-device independent quantum key distribution and Bell-state measurements coexisting with standard internet data and networking equipment

RC Berrevoets, T Middelburg, RFL Vermeulen… - Communications …, 2022 - nature.com
The forthcoming quantum Internet is poised to allow new applications not possible with the
conventional Internet. The ability for both quantum and conventional networking equipment …