Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group
  • CLEO/Europe and EQEC 2009 Conference Digest
  • (Optica Publishing Group, 2009),
  • paper ED4_2

Quantum hacking: how Eve can exploit component imperfections to control yet another of Bob’s single-photon qubit detectors

Not Accessible

Your library or personal account may give you access

Abstract

Security and integrity of the network and the traffic it carries is a key requirement in modem communication systems. Over the past twenty years, quantum key distribution (QKD) has gained world-wide attention. This is because security of its implementations is based on the impossibility, in principle, to reliably copy an a-priori unknown quantum state (no-cloning theorem). However, security also relies on the assumption that electrooptical devices which are part of quantum cryptosystems do not deviate from model assumptions made to establish security proofs. This second range of security threats, which target component imperfections, has already been successfully exploited by one of the authors to take control of commonly used single photon detectors, namely InGaAs-based modules at telecom wavelengths [1] and Silicon-based passively-quenched modules in the visible - near infrared range [2].

© 2009 IEEE

PDF Article
More Like This
Inducing a detector efficiency mismatch to hack a commercial quantum key distribution system

N. Jain, L. Lydersen, C. Wittmann, C. Wiechers, D. Elser, Ch. Marquardt, V. Makarov, and G. Leuchs
CI3_4 The European Conference on Lasers and Electro-Optics (CLEO/Europe) 2011

Fortifying Single Photon Detectors to Quantum Hacking Attacks by Using Wavelength Upconversion

G. S. Kanter
JW2A.7 CLEO: Applications and Technology (CLEO:A&T) 2015

Quantum Key Distribution with an Untrusted Source

Yi Zhao, Bing Qi, and Hoi-Kwong Lo
ITuI3 International Quantum Electronics Conference (IQEC) 2009

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.