Ask a Question

Prefer a chat interface with context about you and your work?

Phase-remapping attack in practical quantum-key-distribution systems

Phase-remapping attack in practical quantum-key-distribution systems

Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we …