Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Feasible attack on detector-device-independent quantum key distribution
by
Ma, Haiqiang
, Xiao, Jinghua
, Liu, Hongwei
, Wei, Kejin
, Sun, Yongmei
, Ji, Yuefeng
, Yang, Xiuqing
, Zhang, Yong
in
639/766/483/3925
/ 639/766/483/481
/ Humanities and Social Sciences
/ multidisciplinary
/ Science
/ Science (multidisciplinary)
2017
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Feasible attack on detector-device-independent quantum key distribution
by
Ma, Haiqiang
, Xiao, Jinghua
, Liu, Hongwei
, Wei, Kejin
, Sun, Yongmei
, Ji, Yuefeng
, Yang, Xiuqing
, Zhang, Yong
in
639/766/483/3925
/ 639/766/483/481
/ Humanities and Social Sciences
/ multidisciplinary
/ Science
/ Science (multidisciplinary)
2017
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Feasible attack on detector-device-independent quantum key distribution
by
Ma, Haiqiang
, Xiao, Jinghua
, Liu, Hongwei
, Wei, Kejin
, Sun, Yongmei
, Ji, Yuefeng
, Yang, Xiuqing
, Zhang, Yong
in
639/766/483/3925
/ 639/766/483/481
/ Humanities and Social Sciences
/ multidisciplinary
/ Science
/ Science (multidisciplinary)
2017
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Feasible attack on detector-device-independent quantum key distribution
Journal Article
Feasible attack on detector-device-independent quantum key distribution
2017
Request Book From Autostore
and Choose the Collection Method
Overview
Recently, to bridge the gap between security of Measurement-device-independent quantum key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector-device-independent QKD (DDI-QKD), has been independently proposed by several groups and has attracted great interest. A higher key rate is obtained, since a single photon bell state measurement (BSM) setup is applied to DDI-QKD. Subsequently, Qi has proposed two attacks for this protocol. However, the first attack, in which Bob’s BSM setup is assumed to be completely a “black box”, is easily prevented by using some additional monitoring devices or by specifically characterizing the BSM. The second attack, which combines the blinding attack and the detector wavelength-dependent efficiency, is not explicitly discussed, and its feasibility is not experimentally confirmed. Here, we show that the second attack is not technically viable because of an intrinsically wavelength-dependent property of a realistic beam splitter, which is an essential component in DDI-QKD. Moreover, we propose a feasible attack that combines a well-known attack—detector blinding attack with intrinsic imperfections of single-photon detectors. The experimental measurement and proof-of-principle test results confirm that our attack can allow Eve to get a copy of quantum keys without being detected and that it is feasible with current technology.
Publisher
Nature Publishing Group UK,Nature Portfolio
MBRLCatalogueRelatedBooks
Related Items
Related Items
We currently cannot retrieve any items related to this title. Kindly check back at a later time.
This website uses cookies to ensure you get the best experience on our website.