The twin-field quantum key distribution (TF-QKD) and its variants can overcome the fundamental rate-distance limit of QKD. However, their physical implementations with the side channels remain the subject of further research. We test the side channel of a type of external intensity modulation that applies a Mach–Zehnder-type electro-optical intensity modulator, which shows the distinguishability of the signal and decoy states in the frequency domain. Based on this security loophole, we propose a side-channel attack, named the passive frequency-shift attack, on the imperfect implementation of the sending or not-sending (SNS) TF-QKD protocol. We analyze the performance of the SNS protocol with the actively odd-parity pairing (AOPP) method und...
Twin-Field (TF) quantum key distribution (QKD) is a major candidate to be the new benchmark for far-...
The recently proposed twin-field quantum key distribution (TF-QKD) effectively overcomes the key cap...
Realistic quantum key distribution (QKD) systems suffer from side-channel attacks, which manipulate ...
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention because it can exc...
In twin-field quantum key distribution the two communicating parties, Alice and Bob, each send a wea...
Twin-field quantum key distribution (TF-QKD) can break the repeaterless linear bound and possess the...
Twin-field (TF) quantum key distribution (QKD) represents a novel QKD approach whose principal merit...
In twin-field quantum key distribution the two communicating parties, Alice and Bob, each send a wea...
We present the method of decoy-state analysis after bit-flip error correction and using confidential...
Quantum communications promise to provide information theoretic security in the exchange of informat...
Quantum key distribution (QKD) is an innovative technology, which exploits the laws of quantum mecha...
We apply the techniques introduced by Kraus et al. [Phys. Rev. Lett. 95, 080501 (2005)] to prove sec...
With the help of quantum key distribution (QKD), two distant peers are able to share information-the...
The sending-or-not-sending (SNS) protocol is one of the most major variants of the twin-field (TF) q...
Twin-Field (TF) quantum key distribution (QKD) is a major candidate to be the new benchmark for far-...
Twin-Field (TF) quantum key distribution (QKD) is a major candidate to be the new benchmark for far-...
The recently proposed twin-field quantum key distribution (TF-QKD) effectively overcomes the key cap...
Realistic quantum key distribution (QKD) systems suffer from side-channel attacks, which manipulate ...
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention because it can exc...
In twin-field quantum key distribution the two communicating parties, Alice and Bob, each send a wea...
Twin-field quantum key distribution (TF-QKD) can break the repeaterless linear bound and possess the...
Twin-field (TF) quantum key distribution (QKD) represents a novel QKD approach whose principal merit...
In twin-field quantum key distribution the two communicating parties, Alice and Bob, each send a wea...
We present the method of decoy-state analysis after bit-flip error correction and using confidential...
Quantum communications promise to provide information theoretic security in the exchange of informat...
Quantum key distribution (QKD) is an innovative technology, which exploits the laws of quantum mecha...
We apply the techniques introduced by Kraus et al. [Phys. Rev. Lett. 95, 080501 (2005)] to prove sec...
With the help of quantum key distribution (QKD), two distant peers are able to share information-the...
The sending-or-not-sending (SNS) protocol is one of the most major variants of the twin-field (TF) q...
Twin-Field (TF) quantum key distribution (QKD) is a major candidate to be the new benchmark for far-...
Twin-Field (TF) quantum key distribution (QKD) is a major candidate to be the new benchmark for far-...
The recently proposed twin-field quantum key distribution (TF-QKD) effectively overcomes the key cap...
Realistic quantum key distribution (QKD) systems suffer from side-channel attacks, which manipulate ...