In the last decade, efforts have been made to reconcile theoretical security with realistic imperfect implementations of quantum key distribution (QKD). Implementable countermeasures are proposed to patch the discovered loopholes. However, certain countermeasures are not as robust as would be expected. In this paper, we present a concrete example of ID Quantique's random-detector-efficiency countermeasure against detector blinding attacks. As a third-party tester, we have found that the first industrial implementation of this countermeasure is effective against the original blinding attack, but not immune to a modified blinding attack. Then, we implement and test a later full version of this countermeasure containing a security proof [C. C....
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the har...
Cryptography is essential for secure communication in the digital era. Today, public-key cryptograph...
Quantum key distribution (QKD) promises information theoretic secure key as long as the device perfo...
Detection-efficiency mismatch is a common problem in practical quantum key distribution (QKD) system...
In the recent decade, it has been discovered that QKD systems are extremely vulnerable to side-chann...
Practical implementations of quantum key distribution (QKD) have been shown to be subject to various...
Security verification for the physical implementation of a cryptography system is an important step ...
Detector-device-independent quantum key distribution (DDI-QKD) held the promise of being robust to d...
We experimentally demonstrate that a single-photon detector ID210 commercially available from ID Qua...
Cryptography plays a key role in today's digital society. The most widely used encryption method is ...
Cryptography plays a key role in today's digital society. The most widely used encryption method is ...
The fabrication of quantum key distribution (QKD) systems typically involves several parties, thus p...
The rules of quantum mechanics makes it possible to exchange a secret key at a distance. This is cal...
We present an active anti-latching system for superconducting nanowire single-photon detectors. We e...
The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its sec...
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the har...
Cryptography is essential for secure communication in the digital era. Today, public-key cryptograph...
Quantum key distribution (QKD) promises information theoretic secure key as long as the device perfo...
Detection-efficiency mismatch is a common problem in practical quantum key distribution (QKD) system...
In the recent decade, it has been discovered that QKD systems are extremely vulnerable to side-chann...
Practical implementations of quantum key distribution (QKD) have been shown to be subject to various...
Security verification for the physical implementation of a cryptography system is an important step ...
Detector-device-independent quantum key distribution (DDI-QKD) held the promise of being robust to d...
We experimentally demonstrate that a single-photon detector ID210 commercially available from ID Qua...
Cryptography plays a key role in today's digital society. The most widely used encryption method is ...
Cryptography plays a key role in today's digital society. The most widely used encryption method is ...
The fabrication of quantum key distribution (QKD) systems typically involves several parties, thus p...
The rules of quantum mechanics makes it possible to exchange a secret key at a distance. This is cal...
We present an active anti-latching system for superconducting nanowire single-photon detectors. We e...
The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its sec...
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the har...
Cryptography is essential for secure communication in the digital era. Today, public-key cryptograph...
Quantum key distribution (QKD) promises information theoretic secure key as long as the device perfo...