Ask a Question

Prefer a chat interface with context about you and your work?

Source attack of decoy-state quantum key distribution using phase information

Source attack of decoy-state quantum key distribution using phase information

Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security loopholes due to imperfect devices. In fact, practical attacks have successfully been demonstrated. Fortunately, most of …