Hidden-Markov-model-based calibration-attack recognition for continuous-variable quantum key distribution

[1]  Émilie Chouzenoux,et al.  Variable Metric Forward–Backward Algorithm for Minimizing the Sum of a Differentiable Function and a Convex Function , 2013, Journal of Optimization Theory and Applications.

[2]  Mario Berta,et al.  Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks. , 2012 .

[3]  Tao Wang,et al.  Robust continuous-variable quantum key distribution against practical attacks , 2017 .

[4]  Adam Prügel-Bennett,et al.  SVM Parameter Optimization using Grid Search and Genetic Algorithm to Improve Classification Performance , 2016 .

[5]  Mu-Sheng Jiang,et al.  Enhancement of the security of a practical continuous-variable quantum-key-distribution system by manipulating the intensity of the local oscillator , 2014 .

[6]  Yuzhen Yu,et al.  A two-grid search scheme for large-scale 3-D finite element analyses of slope stability , 2014 .

[7]  E. Diamanti,et al.  Preventing Calibration Attacks on the Local Oscillator in Continuous-Variable Quantum Key Distribution , 2013, 1304.7024.

[8]  G. Guo,et al.  Quantum hacking on quantum key distribution using homodyne detection , 2014, 1402.6921.

[9]  Nicolas J. Cerf,et al.  Experimental implementation of non-gaussian attacks on a continuous-variable quantum key distribution system , 2007, 2007 Quantum Electronics and Laser Science Conference.

[10]  L. Liang,et al.  Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems , 2013, 1303.6043.

[11]  S. Lloyd,et al.  Characterization of collective Gaussian attacks and security of coherent-state quantum cryptography. , 2008, Physical review letters.

[12]  David Volent Lindberg,et al.  Inference of the Transition Matrix in Convolved Hidden Markov Models and the Generalized Baum–Welch Algorithm , 2015, IEEE Transactions on Geoscience and Remote Sensing.

[13]  Peng Huang,et al.  Practical security of continuous-variable quantum key distribution with finite sampling bandwidth effects , 2016 .

[14]  Witold Pedrycz,et al.  Multivariate time series anomaly detection: A framework of Hidden Markov Models , 2017, Appl. Soft Comput..

[15]  Émilie Chouzenoux,et al.  A block coordinate variable metric forward–backward algorithm , 2016, Journal of Global Optimization.

[16]  E. Diamanti,et al.  Field test of classical symmetric encryption with continuous variables quantum key distribution. , 2012, Optics express.

[17]  Radim Filip,et al.  Long-distance continuous-variable quantum key distribution with efficient channel estimation , 2014 .

[18]  Peng Huang,et al.  Composable security of unidimensional continuous-variable quantum key distribution , 2017, Quantum Information Processing.

[19]  Dirk A. Lorenz,et al.  An Inertial Forward-Backward Algorithm for Monotone Inclusions , 2014, Journal of Mathematical Imaging and Vision.

[20]  Xinghuo Yu,et al.  Detecting Anomalous Behavior in Cloud Servers by Nested-Arc Hidden SEMI-Markov Model with State Summarization , 2019, IEEE Transactions on Big Data.

[21]  Anthony Leverrier,et al.  Composable security proof for continuous-variable quantum key distribution with coherent States. , 2014, Physical review letters.

[22]  S. Srivastava,et al.  Optimisation of Hidden Markov Model using Baum–Welch algorithm for prediction of maximum and minimum temperature over Indian Himalaya , 2017, Journal of Earth System Science.

[23]  G. Guo,et al.  Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack , 2013, 1302.0090.

[24]  Víctor A. Villagrá,et al.  Real-Time Multistep Attack Prediction Based on Hidden Markov Models , 2020, IEEE Transactions on Dependable and Secure Computing.

[25]  P. Grangier,et al.  Finite-size analysis of a continuous-variable quantum key distribution , 2010, 1005.0339.

[26]  Renato Renner,et al.  Security of continuous-variable quantum key distribution against general attacks. , 2012, Physical review letters.

[27]  Zhang Yu,et al.  Application of Improved Grid Search Algorithm on SVM for Classification of Tumor Gene , 2014, MUE 2014.

[28]  Mu-Sheng Jiang,et al.  Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol , 2013 .

[29]  Anthony Leverrier,et al.  Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction. , 2017, Physical review letters.

[30]  Rupesh Kumar,et al.  Homodyne-detector-blinding attack in continuous-variable quantum key distribution , 2018, Physical Review A.

[31]  E. Diamanti,et al.  Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers , 2008, 0812.4314.

[32]  Guihua Zeng,et al.  Integrating machine learning to achieve an automatic parameter prediction for practical continuous-variable quantum key distribution , 2018 .