Boosting quantum key distribution via the end-to-end loss control

AD Kodukhov, VA Pastushenko, NS Kirsanov… - Cryptography, 2023 - mdpi.com
With the rise of quantum technologies, data security increasingly relies on quantum
cryptography and its most notable application, quantum key distribution (QKD). Yet, current …

Practical side-channel attack on free-space QKD systems with misaligned sources and countermeasures

P Arteaga-Díaz, D Cano, V Fernandez - IEEE Access, 2022 - ieeexplore.ieee.org
Practical implementations of quantum key distribution (QKD) protocols can introduce
additional degrees of freedom in the quantum states that may render them distinguishable to …

Mitigating the source-side channel vulnerability by characterisation of photon statistics

T Sharma, A Biswas, J Ramakrishnan… - Journal of Lightwave …, 2024 - ieeexplore.ieee.org
Quantum key distribution (QKD) theoretically offers unconditional security. Unfortunately, the
gap between theory and practice threatens side-channel attacks on practical QKD systems …

[HTML][HTML] Free space continuous variable quantum key distribution with discrete phases

A Rani, P Chandravanshi, J Ramakrishnan, P Vaity… - Physics Open, 2023 - Elsevier
Abstract Quantum Key Distribution (QKD) offers unconditional security in principle. Many
QKD protocols have been proposed and demonstrated to ensure secure communication …

Quantum Pulse Gate Attack on IM/DD Optical Key Distribution Exploiting Symbol Shape Distortion

M Jarzyna, M Jachura… - IEEE Communications …, 2023 - ieeexplore.ieee.org
Intensity modulation/direct detection (IM/DD) optical key distribution (OKD) is a method to
generate a secret key whose security against passive eavesdropping is guaranteed by the …

Extending quantum key distribution through proxy re-encryption

N Lemons, B Gelfand, N Lawrence… - Journal of Optical …, 2023 - opg.optica.org
Modern quantum key distribution (QKD) network designs are based on sending photons
from one node to another and require free-space or dedicated fiber optic cables between …

SOA based BB84 protocol for enhancing quantum key distribution in cloud environment

SK Sehgal, R Gupta - Wireless Personal Communications, 2023 - Springer
Abstract Quantum Key Distribution (QKD) systems are thought to be the best method for
securing data in cloud storage and boosting security and privacy. Due to the increasing use …

Lfsr based rng on low cost fpga for qkd applications

P Chandravanshi, JK Meka, V Mongia… - arXiv preprint arXiv …, 2023 - arxiv.org
Linear-feedback shift register (LFSR) based pseudo-random number generator (PRNG) has
applications in a plethora of fields. The issue of being linear is generally circumvented by …

Enhancing key rates of QKD protocol by Coincidence Detection

T Sharma, R Bhavsar, J Ramakrishnan… - arXiv preprint arXiv …, 2024 - arxiv.org
In theory, quantum key distribution (QKD) provides unconditional security; however, its
practical implementations are susceptible to exploitable vulnerabilities. This investigation …

Vulnerability in free space QKD due to detection coupling mismatch

T Sharma, A Biswas, P Chandravanshi… - IEEE Journal of …, 2023 - ieeexplore.ieee.org
Practical implementations of QKD protocols involve devices which are not perfect, and an
eavesdropper may exploit this to gain information leading to attacks. Here we have …