Hacking Quantum Key Distribution via Injection Locking

@article{Pang2019HackingQK,
  title={Hacking Quantum Key Distribution via Injection Locking},
  author={Xiao-ling Pang and A. Yang and Chao-Ni Zhang and Jian-Peng Dou and H. Li and Jun Gao and X. Jin},
  journal={arXiv: Quantum Physics},
  year={2019}
}
  • Xiao-ling Pang, A. Yang, +4 authors X. Jin
  • Published 2019
  • Computer Science, Physics
  • arXiv: Quantum Physics
  • Unconditionally secure communication, being pursued for thousands of years, however, hasn't been reached yet due to continuous competitions between encryption and hacking. Quantum key distribution (QKD), harnessing the quantum mechanical nature of superposition and non-cloning, may promise unconditional security by incorporating the one-time pad algorithm rigorously proved by Claude Shannon. Massive efforts have been made in building practical and commercial QKD systems, in particular, decoy… CONTINUE READING
    7 Citations
    Laser seeding attack in quantum key distribution
    • 13
    • Highly Influenced
    • PDF
    Quantum Data Encryption as a Service on Demand: Eindhoven QKD Network Testbed
    Quantum-Sim: An Open-Source Co-Simulation Platform for Quantum Key Distribution-Based Smart Grid Communications
    • William Lardier, Quentin Varo, J. Yan
    • Computer Science
    • 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)
    • 2019
    • 1
    Secure quantum key distribution with realistic devices
    • 69
    • PDF

    References

    SHOWING 1-10 OF 39 REFERENCES
    Effect of source tampering in the security of quantum cryptography
    • 29
    • PDF
    Laser seeding attack in quantum key distribution
    • 13
    • PDF
    Attacks exploiting deviation of mean photon number in quantum key distribution and coin-tossing
    • 47
    • PDF
    Avoiding the blinding attack in QKD
    • 77
    Side-channel-free quantum key distribution.
    • 312
    • PDF
    Time-shift attack in practical quantum cryptosystems
    • 224
    • PDF
    Decoy state quantum key distribution.
    • 965
    • PDF