Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group
  • CLEO/Europe and EQEC 2011 Conference Digest
  • OSA Technical Digest (CD) (Optica Publishing Group, 2011),
  • paper CI3_4

Inducing a detector efficiency mismatch to hack a commercial quantum key distribution system

Not Accessible

Your library or personal account may give you access

Abstract

Quantum key distribution (QKD) is poised to be the first widespread implementation of quantum communication. In principle, it offers unconditional security: an eavesdropper introduces errors and thus cannot remain concealed from the legitimate parties. However, in practical implementations the actual security depends on a host of technological and protocol-operational components. Eve could exploit imperfections in Alice’s or Bob’s equipment (such as source or detectors) remotely, or vulnerabilities in the actual implementation of the abstract QKD protocol. Several such attacks have been proposed [1,2], and various proof-of-principle demonstrations on commercial QKD devices have been performed in recent years [3–5].

© 2011 Optical Society of America

PDF Article
More Like This
Preventing Quantum Hacking in Continuous Variable Quantum Key Distribution

Paul Jouguet, Sébastien Kunz-Jacques, and Eleni Diamanti
QW3A.5 Quantum Information and Measurement (QIM) 2014

Security of Post-selection based Continuous Variable Quantum Key Distribution against Arbitrary Attacks

Nathan Walk, Timothy C. Ralph, Thomas Symul, and Ping Koy Lam
JTuC4 CLEO: Applications and Technology (CLEO:A&T) 2011

Quantum hacking of continuous-variable quantum key distribution systems: realtime Trojan-horse attacks

Birgit Stiller, Imran Khan, Nitin Jain, Paul Jouguet, Sebastien Kunz-Jacques, Eleni Diamanti, Christoph Marquardt, and Gerd Leuchs
FF1A.7 CLEO: QELS_Fundamental Science (CLEO:FS) 2015

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.