Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Quantum hacking of continuous-variable quantum key distribution systems: realtime Trojan-horse attacks

Not Accessible

Your library or personal account may give you access

Abstract

We experimentally demonstrate successful Trojan-horse attacks on laboratory and commercial continuous-variable quantum key distribution systems with binary and Gaussian modulation. Furthermore, we analyze appropriate countermeasures regarding their spectral performance.

© 2015 Optical Society of America

PDF Article
More Like This
Preventing Quantum Hacking in Continuous Variable Quantum Key Distribution

Paul Jouguet, Sébastien Kunz-Jacques, and Eleni Diamanti
QW3A.5 Quantum Information and Measurement (QIM) 2014

Calibration Attack and Defense in Continuous Variable Quantum Key Distribution

Agnes Ferenczi, Philippe Grangier, and Frédéric Grosshans
IC_13 International Quantum Electronics Conference (IQEC) 2007

Experimental Implementation of Non-Gaussian Attacks on a Continuous-Variable Quantum Key Distribution System

Jérôme Lodewyck, Thierry Debuisschert, Raul Garcia-Patron, Rosa Tualle-Brouri, Nicolas J. Cerf, and Philippe Grangier
QThH5 Quantum Electronics and Laser Science Conference (CLEO:FS) 2007

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.