Review of security methods based on classical cryptography and quantum cryptography

S Subramani, SK Svn - Cybernetics and Systems, 2023 - Taylor & Francis
Classical cryptography is the process of hiding information and it manages the secret
knowledge by encrypting the plain text message through the translation of it to an …

Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch

S Sajeed, P Chaiwongkhot, JP Bourgoin, T Jennewein… - Physical Review A, 2015 - APS
In free-space quantum key distribution (QKD), the sensitivity of the receiver's detector
channels may depend differently on the spatial mode of incoming photons. Consequently …

Preparing a commercial quantum key distribution system for certification against implementation loopholes

V Makarov, A Abrikosov, P Chaiwongkhot… - Physical Review …, 2024 - APS
A commercial quantum key distribution (QKD) system needs to be formally certified to
enable its wide deployment. The certification should include the system's robustness against …

Effect of source tampering in the security of quantum cryptography

SH Sun, F Xu, MS Jiang, XC Ma, HK Lo, LM Liang - Physical Review A, 2015 - APS
The security of source has become an increasingly important issue in quantum
cryptography. Based on the framework of measurement-device-independent quantum key …

Practical side-channel attack on free-space QKD systems with misaligned sources and countermeasures

P Arteaga-Díaz, D Cano, V Fernandez - IEEE Access, 2022 - ieeexplore.ieee.org
Practical implementations of quantum key distribution (QKD) protocols can introduce
additional degrees of freedom in the quantum states that may render them distinguishable to …

Robust countermeasure against detector control attack in a practical quantum key distribution system

YJ Qian, DY He, S Wang, W Chen, ZQ Yin, GC Guo… - Optica, 2019 - opg.optica.org
In real-life implementations of quantum key distribution (QKD), the physical systems with
unwanted imperfections would be exploited by an eavesdropper. Based on imperfections in …

Leveraging generative adversarial networks for enhanced cryptographic key generation

P Singh, P Pranav, S Anwar… - … and Computation: Practice …, 2024 - Wiley Online Library
In this research, we present an innovative cryptographic key generation method utilizing a
Generative Adversarial Network (GAN), enhanced by Merkel tree verification, marking a …

Quantum key distribution with untrusted detectors

P González, L Rebón, T Ferreira da Silva, M Figueroa… - Physical Review A, 2015 - APS
Side-channel attacks currently constitute the main challenge for quantum key distribution
(QKD) to bridge theory with practice. So far two main approaches have been introduced to …

[HTML][HTML] Detector-device-independent quantum key distribution: Security analysis and fast implementation

A Boaron, B Korzh, R Houlmann, G Boso… - Journal of Applied …, 2016 - pubs.aip.org
One of the most pressing issues in quantum key distribution (QKD) is the problem of detector
side-channel attacks. To overcome this problem, researchers proposed an elegant “time …

Efficient high-dimensional quantum key distribution with hybrid encoding

Y Jo, HS Park, SW Lee, W Son - Entropy, 2019 - mdpi.com
We propose a schematic setup of quantum key distribution (QKD) with an improved secret
key rate based on high-dimensional quantum states. Two degrees-of-freedom of a single …