Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Subcarrier wave quantum key distribution with leaky and flawed devices

Not Accessible

Your library or personal account may give you access

Abstract

In this paper, we consider the influence of device imperfections on the performance of the subcarrier wave quantum key distribution system. For instance, we consider the utilization of a non-phase-randomized coherent light source, the possibility of detector blinding, and its consequences. The common opinion is that the presence of a coherent light source in the system provides the possibility for a photon number splitting attack to an eavesdropper. We show that the attack is inapplicable or inefficient in the case of the considered states (without assumption of phase randomization). We also provide the conditions for estimation of a detector blinding attack. Moreover, we demonstrate that not only hardware countermeasures are applicable to revealing the attack, but also utilization of special protocol construction can be implied. Thus, we conclude that the imperfections of the considered devices can easily be leveled due to the features of implemented states and protocol construction.

© 2022 Optical Society of America

Full Article  |  PDF Article
More Like This
Four-state reference-frame-independent quantum key distribution with non-qubit source flaws

Zhenhua Li, Tianqi Dou, Hongwei Liu, Jipeng Wang, Zhongqi Sun, Fen Zhou, Yanxin Han, Yuqing Huang, and Haiqiang Ma
J. Opt. Soc. Am. B 39(4) 1158-1164 (2022)

Security of subcarrier wave quantum key distribution against the collective beam-splitting attack

G. P. Miroshnichenko, A. V. Kozubov, A. A. Gaidash, A. V. Gleim, and D. B. Horoshko
Opt. Express 26(9) 11292-11308 (2018)

Methods of decreasing the unambiguous state discrimination probability for subcarrier wave quantum key distribution systems

Andrei Gaidash, Anton Kozubov, and George Miroshnichenko
J. Opt. Soc. Am. B 36(3) B16-B19 (2019)

Data Availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (1)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (60)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.