Literature DB >> 22540685

Side-channel-free quantum key distribution.

Samuel L Braunstein1, Stefano Pirandola.   

Abstract

Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter to eliminate side-channel attacks. By using a quantum memory we find that we are able to bound the secret-key rate below by the entanglement-distillation rate computed over the distributed states.

Year:  2012        PMID: 22540685     DOI: 10.1103/PhysRevLett.108.130502

Source DB:  PubMed          Journal:  Phys Rev Lett        ISSN: 0031-9007            Impact factor:   9.161


  28 in total

1.  Experimental measurement-device-independent quantum digital signatures.

Authors:  G L Roberts; M Lucamarini; Z L Yuan; J F Dynes; L C Comandar; A W Sharpe; A J Shields; M Curty; I V Puthoor; E Andersson
Journal:  Nat Commun       Date:  2017-10-23       Impact factor: 14.919

2.  Experimental quantum key distribution certified by Bell's theorem.

Authors:  D P Nadlinger; P Drmota; B C Nichol; G Araneda; D Main; R Srinivas; D M Lucas; C J Ballance; K Ivanov; E Y-Z Tan; P Sekatski; R L Urbanke; R Renner; N Sangouard; J-D Bancal
Journal:  Nature       Date:  2022-07-27       Impact factor: 69.504

3.  Continuous variable measurement device independent quantum conferencing with postselection.

Authors:  Alasdair I Fletcher; Stefano Pirandola
Journal:  Sci Rep       Date:  2022-10-15       Impact factor: 4.996

4.  Quantum discord as a resource for quantum cryptography.

Authors:  Stefano Pirandola
Journal:  Sci Rep       Date:  2014-11-07       Impact factor: 4.379

5.  General immunity and superadditivity of two-way Gaussian quantum cryptography.

Authors:  Carlo Ottaviani; Stefano Pirandola
Journal:  Sci Rep       Date:  2016-03-01       Impact factor: 4.379

6.  Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources.

Authors:  Ting-Ting Song; Su-Juan Qin; Qiao-Yan Wen; Yu-Kun Wang; Heng-Yue Jia
Journal:  Sci Rep       Date:  2015-10-16       Impact factor: 4.379

7.  Quantum key distribution with prepare-and-measure Bell test.

Authors:  Yong-Gang Tan
Journal:  Sci Rep       Date:  2016-10-13       Impact factor: 4.379

8.  Security of quantum key distribution with multiphoton components.

Authors:  Hua-Lei Yin; Yao Fu; Yingqiu Mao; Zeng-Bing Chen
Journal:  Sci Rep       Date:  2016-07-07       Impact factor: 4.379

9.  Simulating of the measurement-device independent quantum key distribution with phase randomized general sources.

Authors:  Qin Wang; Xiang-Bin Wang
Journal:  Sci Rep       Date:  2014-04-14       Impact factor: 4.379

10.  Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol.

Authors:  Akihiro Mizutani; Kiyoshi Tamaki; Rikizo Ikuta; Takashi Yamamoto; Nobuyuki Imoto
Journal:  Sci Rep       Date:  2014-06-10       Impact factor: 4.379

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.