Advances in quantum cryptography

S Pirandola, UL Andersen, L Banchi… - Advances in optics …, 2020 - opg.optica.org
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …

Robust countermeasure against detector control attack in a practical quantum key distribution system

YJ Qian, DY He, S Wang, W Chen, ZQ Yin, GC Guo… - Optica, 2019 - opg.optica.org
In real-life implementations of quantum key distribution (QKD), the physical systems with
unwanted imperfections would be exploited by an eavesdropper. Based on imperfections in …

Controlling single-photon detector ID210 with bright light

V Chistiakov, A Huang, V Egorov, V Makarov - Optics express, 2019 - opg.optica.org
We experimentally demonstrate that a single-photon detector ID210 commercially available
from ID Quantique is vulnerable to blinding and can be fully controlled by bright illumination …

Hacking single-photon avalanche detectors in quantum key distribution via pulse illumination

Z Wu, A Huang, H Chen, SH Sun, J Ding, X Qiang… - Optics …, 2020 - opg.optica.org
Quantum key distribution (QKD) has been proved to be information-theoretically secure in
theory. Unfortunately, the imperfect devices in practice compromise its security. Thus, to …

Comment on" Inherent security of phase coding quantum key distribution systems against detector blinding attacks"[Laser Phys. Lett. 15, 095203 (2018)]

A Fedorov, I Gerhardt, A Huang, J Jogenfors… - arXiv preprint arXiv …, 2018 - arxiv.org
arXiv:1809.03911v1 [quant-ph] 11 Sep 2018 Page 1 arXiv:1809.03911v1 [quant-ph] 11 Sep
2018 Comment on “Inherent security of phase coding quantum key distribution systems …

Countermeasure against quantum hacking using detection statistics

G Gras, D Rusca, H Zbinden, F Bussières - Physical Review Applied, 2021 - APS
Detector blinding attacks have been proposed in the last few years, and they could
potentially threaten the security of quantum key distribution systems. Even though such …

Quantum control attack: Towards joint estimation of protocol and hardware loopholes

A Kozubov, A Gaidash, G Miroshnichenko - Physical Review A, 2021 - APS
In this paper we present the approach for description of quantum control attack based on
combined protocol and hardware loopholes. It consolidates intercept-resend attack and …

Faking photon number on a transition-edge sensor

P Chaiwongkhot, J Zhong, A Huang, H Qin… - EPJ Quantum …, 2022 - epjqt.epj.org
We study potential security vulnerabilities of a single-photon detector based on
superconducting transition-edge sensor. In one experiment, we show that an adversary …

Detector blinding attacks on counterfactual quantum key distribution

C Navas-Merlo, JC Garcia-Escartin - Quantum Information Processing, 2021 - Springer
Counterfactual quantum key distribution protocols allow two sides to establish a common
secret key using an insecure channel and authenticated public communication. As opposed …

Intrinsic mitigation of the after-gate attack in quantum key distribution through fast-gated delayed detection

A Koehler-Sidki, JF Dynes, A Martinez, M Lucamarini… - Physical Review …, 2019 - APS
The information-theoretic security promised by quantum key distribution (QKD) holds as long
as the assumptions in the theoretical model match the parameters in the physical …