Secure quantum key distribution with realistic devices

F Xu, X Ma, Q Zhang, HK Lo, JW Pan - Reviews of modern physics, 2020 - APS
In principle, quantum key distribution (QKD) offers information-theoretic security based on
the laws of physics. In practice, however, the imperfections of realistic devices might …

A review of security evaluation of practical quantum key distribution system

S Sun, A Huang - Entropy, 2022 - mdpi.com
Although the unconditional security of quantum key distribution (QKD) has been widely
studied, the imperfections of the practical devices leave potential loopholes for Eve to spy …

Full-field implementation of a perfect eavesdropper on a quantum cryptography system

I Gerhardt, Q Liu, A Lamas-Linares, J Skaar… - Nature …, 2011 - nature.com
Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its
security is founded on the principles of quantum mechanics, but in reality it significantly …

Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack

JZ Huang, C Weedbrook, ZQ Yin, S Wang, HW Li… - Physical Review A …, 2013 - APS
The security proofs of continuous-variable quantum key distribution are based on the
assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's …

Long-distance quantum key distribution secure against coherent attacks

B Fröhlich, M Lucamarini, JF Dynes, LC Comandar… - Optica, 2017 - opg.optica.org
Quantum key distribution (QKD) permits information-theoretically secure transmission of
digital encryption keys, assuming that the behavior of the devices employed for the key …

Alternative schemes for measurement-device-independent quantum key distribution

X Ma, M Razavi - Physical Review A—Atomic, Molecular, and Optical …, 2012 - APS
Practical schemes for measurement-device-independent quantum key distribution using
phase and path or time encoding are presented. In addition to immunity to existing …

Device calibration impacts security of quantum key distribution

N Jain, C Wittmann, L Lydersen, C Wiechers, D Elser… - Physical Review Letters, 2011 - APS
Characterizing the physical channel and calibrating the cryptosystem hardware are
prerequisites for establishing a quantum channel for quantum key distribution (QKD) …

Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors

H Weier, H Krauss, M Rau, M Fürst… - New Journal of …, 2011 - iopscience.iop.org
The security of quantum key distribution (QKD) can easily be obscured if the eavesdropper
can utilize technical imperfections in the actual implementation. Here, we describe and …

Risk analysis of Trojan-horse attacks on practical quantum key distribution systems

N Jain, B Stiller, I Khan, V Makarov… - IEEE Journal of …, 2014 - ieeexplore.ieee.org
An eavesdropper Eve may probe a quantum key distribution (QKD) system by sending a
bright pulse from the quantum channel into the system and analyzing the back-reflected …

Quantum hacking on quantum key distribution using homodyne detection

JZ Huang, S Kunz-Jacques, P Jouguet, C Weedbrook… - Physical Review A, 2014 - APS
Imperfect devices in commercial quantum key distribution systems open security loopholes
that an eavesdropper may exploit. An example of one such imperfection is the wavelength …