Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Practical Security of Continuous Variable Quantum Key Distribution Ascribable to Imperfect Modulator for Fiber Channel
by
Guo, Ying
, Zhou, Zicheng
, Xu, Shengzhe
in
Amplitudes
/ Communications equipment
/ Continuity (mathematics)
/ continuous-variable
/ Frequency modulation
/ Investment analysis
/ Leakage
/ Light
/ Loopholes
/ practical security
/ Quantum cryptography
/ quantum key distribution
/ Quantum physics
/ Quantum theory
/ Security
/ Sensors
/ Transmitters
/ Variables
2024
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Practical Security of Continuous Variable Quantum Key Distribution Ascribable to Imperfect Modulator for Fiber Channel
by
Guo, Ying
, Zhou, Zicheng
, Xu, Shengzhe
in
Amplitudes
/ Communications equipment
/ Continuity (mathematics)
/ continuous-variable
/ Frequency modulation
/ Investment analysis
/ Leakage
/ Light
/ Loopholes
/ practical security
/ Quantum cryptography
/ quantum key distribution
/ Quantum physics
/ Quantum theory
/ Security
/ Sensors
/ Transmitters
/ Variables
2024
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Practical Security of Continuous Variable Quantum Key Distribution Ascribable to Imperfect Modulator for Fiber Channel
by
Guo, Ying
, Zhou, Zicheng
, Xu, Shengzhe
in
Amplitudes
/ Communications equipment
/ Continuity (mathematics)
/ continuous-variable
/ Frequency modulation
/ Investment analysis
/ Leakage
/ Light
/ Loopholes
/ practical security
/ Quantum cryptography
/ quantum key distribution
/ Quantum physics
/ Quantum theory
/ Security
/ Sensors
/ Transmitters
/ Variables
2024
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Practical Security of Continuous Variable Quantum Key Distribution Ascribable to Imperfect Modulator for Fiber Channel
Journal Article
Practical Security of Continuous Variable Quantum Key Distribution Ascribable to Imperfect Modulator for Fiber Channel
2024
Request Book From Autostore
and Choose the Collection Method
Overview
An amplitude modulator plays an essential role in the implementation of continuous-variable quantum key distribution (CVQKD), whereas it may bring about a potential security loophole in the practical system. The high-frequency modulation of the actual transmitter usually results in the high rate of the system. However, an imperfect amplitude modulator (AM) can give birth to a potential information leakage from the modulation of the transmitter. To reveal a potential security loophole from the high-frequency AM embedded in the transmitter, we demonstrate an influence on the practical security of the system in terms of the secret key rate and maximal transmission distance. The results indicate the risk of this security loophole in the imperfect AM-embedded transmitter. Fortunately, the legal participants can trace back the potential information leakage that has been produced from the imperfect transmitter at high frequencies, which can be used for defeating the leakage attack in CVQKD. We find the limitations of the imperfect AM-embedded transmitter of the high-frequency quantum system, and hence, we have to trade off the practical security and the modulation frequency of the AM-embedded transmitter while considering its implementation in a practical environment.
This website uses cookies to ensure you get the best experience on our website.