Security analyses of quantum cryptographic protocols typically rely on certain conditions; one such condition is that the sender (Alice) and receiver (Bob) have isolated devices inaccessible to third parties. If an eavesdropper (Eve) has a side-channel into one of the devices, then the key rate may be sensibly reduced. In this paper, we consider an attack on a coherent-state protocol, where Eve not only taps the main communication channel but also hacks Alice's device. This is done by introducing a Trojan horse mode with low mean number of photons $\bar{n}$ which is then modulated in a similar way to the signal state. First we show that this strategy can be reduced to an attack without side channels but with higher loss and noise in the mai...
We propose an efficient strategy to attack a continuous-variable (CV) quantum key distribution (QKD)...
The theoretical existence of photon-number-splitting attacks creates a security loophole for most qu...
Quantum cryptographic protocols are typically analyzed by assuming that potential opponents can carr...
We propose a quantum key distribution scheme by using screening angles and analyzing detectors which...
An intercept-resend attack on a continuous-variable quantum-key-distribution protocol is investigate...
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright li...
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright li...
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright l...
General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's sy...
Quantum key distribution's (QKD's) central and unique claim is information theoretic security. Howev...
AbstractQuantum key distribution (QKD) is intended to produce cryptographic secret keys between two ...
The security of source has become an increasingly important issue in quantum cryptography. Based on ...
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proo...
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proo...
In this work our aim has been to elucidate our theoretical developments that bolster the efficiency ...
We propose an efficient strategy to attack a continuous-variable (CV) quantum key distribution (QKD)...
The theoretical existence of photon-number-splitting attacks creates a security loophole for most qu...
Quantum cryptographic protocols are typically analyzed by assuming that potential opponents can carr...
We propose a quantum key distribution scheme by using screening angles and analyzing detectors which...
An intercept-resend attack on a continuous-variable quantum-key-distribution protocol is investigate...
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright li...
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright li...
A quantum key distribution (QKD) system may be probed by an eavesdropper Eve by sending in bright l...
General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's sy...
Quantum key distribution's (QKD's) central and unique claim is information theoretic security. Howev...
AbstractQuantum key distribution (QKD) is intended to produce cryptographic secret keys between two ...
The security of source has become an increasingly important issue in quantum cryptography. Based on ...
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proo...
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proo...
In this work our aim has been to elucidate our theoretical developments that bolster the efficiency ...
We propose an efficient strategy to attack a continuous-variable (CV) quantum key distribution (QKD)...
The theoretical existence of photon-number-splitting attacks creates a security loophole for most qu...
Quantum cryptographic protocols are typically analyzed by assuming that potential opponents can carr...