Phase drift is an inherent problem in one-way phase-encoded quantum key distribution (QKD) systems. Although combining passive with active phase compensation (APC) processes can effectively compensate for the phase drift, the security problems brought about by these processes are rarely considered. In this paper, we point out a security hole in the APC process and put forward a corresponding attack scheme. Under our proposed attack, the quantum bit error rate (QBER) of the QKD can be close to zero for some conditions. However, under the same conditions the ratio r of the key “0” and the key “1” which Bob (the legal communicators Alice and Bob) gets is no longer 1:1 but 2:1, which may expose Eve (the eavesdropper). In order to solve this pro...
Cryptography plays a key role in today's digital society. The most widely used encryption method is ...
We give a security proof of the ‘round-robin differential phase shift’ (RRDPS) quantum key distribut...
With the emergence of an information society, the idea of protecting sensitive data is steadily gain...
Quantum key distribution (QKD) can provide unconditional security based on the fundamental laws of q...
Quantum key distribution (QKD) can provide unconditional security based on the fundamental laws of q...
Realistic quantum key distribution (QKD) systems suffer from side-channel attacks, which manipulate ...
Continuous-variable quantum key distribution (CV-QKD) with a real local oscillator (LO) experiences ...
We give the first information-theoretic security proof of the `Round Robin Differential Phase Shift'...
Physical implementations of quantum key distribution (QKD) protocols, like the Bennett-Brassard (BB8...
The rules of quantum mechanics makes it possible to exchange a secret key at a distance. This is cal...
We show that partially trusting the phase noise associated with estimation uncertainty in a LLO CVQK...
AbstractQuantum key distribution (QKD) is intended to produce cryptographic secret keys between two ...
Quantum key distribution allows remote parties to generate information-theoretic secure keys. The bo...
Cryptography plays a key role in today's digital society. The most widely used encryption method is ...
Quantum key distribution (QKD) is a new way of sharing secret cryptographic keys with unconditional ...
Cryptography plays a key role in today's digital society. The most widely used encryption method is ...
We give a security proof of the ‘round-robin differential phase shift’ (RRDPS) quantum key distribut...
With the emergence of an information society, the idea of protecting sensitive data is steadily gain...
Quantum key distribution (QKD) can provide unconditional security based on the fundamental laws of q...
Quantum key distribution (QKD) can provide unconditional security based on the fundamental laws of q...
Realistic quantum key distribution (QKD) systems suffer from side-channel attacks, which manipulate ...
Continuous-variable quantum key distribution (CV-QKD) with a real local oscillator (LO) experiences ...
We give the first information-theoretic security proof of the `Round Robin Differential Phase Shift'...
Physical implementations of quantum key distribution (QKD) protocols, like the Bennett-Brassard (BB8...
The rules of quantum mechanics makes it possible to exchange a secret key at a distance. This is cal...
We show that partially trusting the phase noise associated with estimation uncertainty in a LLO CVQK...
AbstractQuantum key distribution (QKD) is intended to produce cryptographic secret keys between two ...
Quantum key distribution allows remote parties to generate information-theoretic secure keys. The bo...
Cryptography plays a key role in today's digital society. The most widely used encryption method is ...
Quantum key distribution (QKD) is a new way of sharing secret cryptographic keys with unconditional ...
Cryptography plays a key role in today's digital society. The most widely used encryption method is ...
We give a security proof of the ‘round-robin differential phase shift’ (RRDPS) quantum key distribut...
With the emergence of an information society, the idea of protecting sensitive data is steadily gain...