Quantum key distribution security threat: the backflash light case
暂无分享,去创建一个
Alberto Tosi | Zhiliang Yuan | Marco Genovese | Giorgio Brida | Ivo Pietro Degiovanni | Alice Meda | A. Tosi | Zhiliang Yuan | I. Degiovanni | A. Meda | G. Brida | M. Genovese
[1] J. Skaar,et al. Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.
[2] Gerd Leuchs,et al. Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.
[3] Feihu Xu,et al. Concise security bounds for practical decoy-state quantum key distribution , 2013, 1311.7129.
[4] V. Scarani,et al. The security of practical quantum key distribution , 2008, 0802.4155.
[5] H. Weinfurter,et al. The breakdown flash of silicon avalanche photodiodes-back door for eavesdropper attacks? , 2001, quant-ph/0104103.
[6] A. Lacaita,et al. On the bremsstrahlung origin of hot-carrier-induced photons in silicon devices , 1993 .
[7] Alberto Tosi,et al. Avalanche Current Waveform Estimated From Electroluminescence in InGaAs/InP SPADs , 2013, IEEE Photonics Technology Letters.
[8] H. Weinfurter,et al. Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors , 2011, 1101.5289.
[9] R. Hadfield. Single-photon detectors for optical quantum information applications , 2009 .
[10] Dong Liu,et al. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources , 2011, 1110.4574.
[11] M. Curty,et al. Secure quantum key distribution , 2014, Nature Photonics.
[12] Christian Kurtsiefer,et al. Experimentally faking the violation of Bell's inequalities. , 2011, Physical review letters.
[13] Feihu Xu,et al. Experimental demonstration of phase-remapping attack in a practical quantum key distribution system , 2010, 1005.2376.
[14] P. Healey,et al. Optical time domain reflectometry — a performance comparison of the analogue and photon counting techniques , 1984 .
[15] Christian Kurtsiefer,et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.
[16] H. Bechmann-Pasquinucci,et al. Quantum cryptography , 2001, quant-ph/0101098.
[17] Alberto Tosi,et al. Quantifying backflash radiation to prevent zero-error attacks in quantum key distribution , 2017, Light, science & applications.
[18] Chun-Yan Li,et al. Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states , 2012 .