Faint laser quantum key distribution: Eavesdropping exploiting multiphoton pulses

Type: Article

Publication Date: 2001-11-01

Citations: 57

DOI: https://doi.org/10.1080/09500340108240903

Abstract

Abstract The technological possibilities of a realistic eavesdropper are discussed. Two eavesdropping strategies taking advantage of multiphoton pulses in faint laser QKD are presented. We conclude that, as long as storage of qubits is technically impossible, faint laser QKD is not limited by this security issue, but mostly by the detector noise.

Locations

  • arXiv (Cornell University) - View - PDF
  • DataCite API - View
  • Journal of Modern Optics - View

Similar Works

Action Title Year Authors
+ PDF Chat Faint laser quantum key distribution: eavesdropping exploiting multiphoton pulses 2001 Stéphane Félix
Nicolas Gisin
André Stefanov
Hugo Zbinden
+ PDF Chat Photon-number-resolving decoy-state quantum key distribution 2006 Qing-yu Cai
Yong-Gang Tan
+ Laser damage creates backdoors in quantum communications 2015 Vadim Makarov
Jean‐Philippe Bourgoin
Poompong Chaiwongkhot
Mathieu Gagné
Thomas Jennewein
Sarah Kaiser
Raman Kashyap
Matthieu Legré
Carter Minshull
Shihan Sajeed
+ Efficient quantum key distribution with practical sources and detectors 2006 Masato Koashi
+ PDF Chat Security of the decoy state method for quantum key distribution 2020 А. ĐĄ. ĐąŃ€ŃƒŃˆĐ”Ń‡ĐșĐžĐœ
Evgeniy O. Kiktenko
D. A. Kronberg
Aleksey K. Fedorov
+ PDF Chat Finite-key security analysis of quantum key distribution with imperfect light sources 2015 Akihiro Mizutani
Marcos Curty
Charles Ci Wen Lim
Nobuyuki Imoto
Kiyoshi Tamaki
+ Comment on "Decoy State Quantum Key Distribution" 2005 Xiang‐Bin Wang
+ PDF Chat Practical Quantum Key Distribution That is Secure Against Side Channels 2021 Álvaro Navarrete
Margarida Pereira
Marcos Curty
Kiyoshi Tamaki
+ PDF Chat Quantum key distribution without detector vulnerabilities using optically seeded lasers 2016 L. C. Comandar
Marco Lucamarini
B. Fröhlich
J. F. Dynes
A. W. Sharpe
Swb Tam
Zhiliang Yuan
Richard V. Penty
A. J. Shields
+ Enhancing practical security of quantum key distribution with a few decoy states 2005 Jim Harrington
Jean Ettinger
Richard Hughes
J. E. Nordholt
+ PDF Chat Hidden Probe Attacks on Ultralong Fiber Laser Key Distribution Systems 2017 Juan Carlos García‐Escartín
Pedro Chamorro‐Posada
+ Hidden probe attacks on ultralong fiber laser key distribution systems 2017 Juan Carlos García‐Escartín
Pedro Chamorro‐Posada
+ Hidden probe attacks on ultralong fiber laser key distribution systems 2017 Juan Carlos García‐Escartín
Pedro Chamorro‐Posada
+ Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources 2022 Jie Gu
Xiaoyu Cao
Yao Fu
Zongwu He
Zejie Yin
Hua‐Lei Yin
Zeng‐Bing Chen
+ PDF Chat Limitations on Practical Quantum Cryptography 2000 Gilles Brassard
Norbert LĂŒtkenhaus
Tal Mor
Barry C. Sanders
+ PDF Chat Decoy-state quantum key distribution with more than three types of photon intensity pulses 2018 H. F. Chau
+ Optimal experimental scheme for practical BB84 quantum key distribution protocol with weak coherent sources, noises, and high losses 2005 Qing-yu Cai
+ A brief history of the decoy-state method for practical quantum key distribution 2005 X. B. Wang
+ PDF Chat Experimental twin-field quantum key distribution with flawed and correlated sources 2022 Jie Gu
Xiaoyu Cao
Yao Fu
Zongwu He
Zejie Yin
Hua‐Lei Yin
Zeng‐Bing Chen
+ PDF Chat Comparison of non-decoy single-photon source and decoy weak coherent pulse in quantum key distribution 2024 Roberto G. Pousa
Daniel K. L. Oi
John Jeffers