Quantum key distribution with hacking countermeasures and long term field trial
نویسندگان
چکیده
منابع مشابه
Field and long-term demonstration of a wide area quantum key distribution network
A wide area quantum key distribution (QKD) network deployed on communication infrastructures provided by China Mobile Ltd. is demonstrated. Three cities and two metropolitan area QKD networks were linked up to form the Hefei-Chaohu-Wuhu wide area QKD network with over 150 kilometers coverage area, in which Hefei metropolitan area QKD network was a typical full-mesh core network to offer all-to-...
متن کاملRetraction: Hacking on decoy-state quantum key distribution system with partial phase randomization
This corrects the article DOI: 10.1038/srep04759.
متن کاملHacking on decoy-state quantum key distribution system with partial phase randomization
Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when ...
متن کاملLong distance free-space quantum key distribution
In the age of information and globalisation, secure communication as well as the protection of sensitive data against unauthorised access are of utmost importance. Quantum cryptography currently provides the only way to exchange a cryptographic key between two parties in an unconditionally secure fashion. Owing to losses and noise of today’s optical fibre and detector technology, at present qua...
متن کاملday field trial of high speed quantum key distribution with implementation security
Quantum key distribution’s central and unique claim is information theoretic security. However there is an increasing awareness that the security of real QKD systems relies not only on theoretical security proofs, but also on how closely the system matches the theoretical models and resists known attacks. These hacking or side channel attacks exploit physical devices which do not necessarily be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientific Reports
سال: 2017
ISSN: 2045-2322
DOI: 10.1038/s41598-017-01884-0