Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 2 de 2
Filtrar
Más filtros

Banco de datos
Tipo del documento
Asunto de la revista
País de afiliación
Intervalo de año de publicación
1.
Opt Express ; 31(24): 40730-40740, 2023 Nov 20.
Artículo en Inglés | MEDLINE | ID: mdl-38041365

RESUMEN

Semi-quantum key distribution (SQKD) protocols are used to distribute secret keys between a quantum party and a classical party. However, existing SQKD protocols rely on two-way communication, and may still be vulnerable to Trojan horse side-channel attacks where Eve sends her own photon into a receiver's apparatus and measures the reflected photon to estimate the key. In this paper, we propose a practical SQKD with one-way key. This requires that the single photons travelling through the one-way channel are used to encode bit information, and the returned photons are used to quantify Eve's information, thus reducing the security analysis of the Trojan horse attack in SQKD. Meanwhile, our protocol with one basis enjoys security advantage in practical SQKD systems when source flaws are taken into account. In particular, the present protocol is secure under practical conditions when weak coherent pulses (WCP) are used. Our simulation results show that the protocol using WCP can distribute secret keys over a distance of 110 km without decoy states.

2.
Heliyon ; 9(2): e13719, 2023 Feb.
Artículo en Inglés | MEDLINE | ID: mdl-36879753

RESUMEN

Compared with the traditional BB84 protocol, the counterfactual quantum key distribution (QKD) does not rely on any signal travelling in the quantum channel, and therefore can present a security advantage where Eve cannot fully access signal. However, the practical system may be damaged in a scenario where the devices are untrusted. In this paper, we analyze the security of counterfactual QKD in untrusted detectors scenario. We show that the requirement to disclose "which detector clicked" has become the main loophole in all counterfactual QKD versions. An eavesdropping scheme which is similar to the memory attack on device-independent QKD could break its security by exploiting detectors' imperfections. We consider two different counterfactual QKD protocols and analyze their security against this major loophole. One is a modified Noh09 protocol, which would be secure in untrusted detectors context. Another is a variant of counterfactual QKD with high efficiency (Phys. Rev. A 104 (2021) 022424) against a series of detectors side-channel attacks as well as against other attacks that exploit detectors imperfections.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA