Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system
نویسندگان
چکیده
منابع مشابه
Quantum key distribution using quantum Faraday rotators.
We propose a new quantum key distribution (QKD) protocol based on the fully quantum mechanical states of Faraday rotators. The protocol is unconditionally secure against collective attacks for a multi-photon source of up to two photons on a noisy environment. It is also robust against impersonation attacks. The protocol may be implemented experimentally with the current spintronics technology o...
متن کاملPhase-Remapping Attack in Practical Quantum Key Distribution Systems
Chi-Hang Fred Fung, ∗ Bing Qi, † Kiyoshi Tamaki, ‡ and Hoi-Kwong Lo § Center for Quantum Information and Quantum Control, Department of Electrical & Computer Engineering and Department of Physics, University of Toronto, Toronto, Ontario, Canada NTT Basic Research Laboratories, NTT corporation, 3-1,Morinosato Wakamiya Atsugi-Shi, Kanagawa, 243-0198; CREST, JST Agency, 4-1-8 Honcho, Kawaguchi, Sa...
متن کاملSaturation Attack on Continuous-Variable Quantum Key Distribution System
Introduction Quantum key distribution (QKD) [1] enables two remote parties Alice and Bob to share common secure keys which are unknown to a potential eavesdropper. Unconditional security of QKD is based on the fundamental laws of quantum mechanics, but in reality, securities of practical QKD systems could be jeopardized by physical implementations. In discretevariable (DV) QKD system, due to de...
متن کاملPractical Quantum Private Database Queries Based on Passive Round-Robin Differential Phase-shift Quantum Key Distribution
A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, a...
متن کاملPassive Decoy State Quantum Key Distribution
The use of decoy states enhances the performance of practical quantum key distribution systems significantly by monitoring the quantum channel in a more detailed way. While active modulation of the intensity of the pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Known passive methods involve parametric down...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2011
ISSN: 1050-2947,1094-1622
DOI: 10.1103/physreva.83.062331