Abstract
We show that using verifiable secret sharing and multiple optical devices and classical post-processing units, one could re-establish the security of quantum key distribution against covert channels and partly malicious classical post-processing units.
© 2017 Optical Society of America
PDF ArticleMore Like This
Yichen Zhang, Zhengyu Li, Song Yu, and Hong Guo
JW4A.33 Frontiers in Optics (FiO) 2017
Antonio Acin
FF1A.1 CLEO: QELS_Fundamental Science (CLEO:FS) 2015
Nathan Walk, Timothy C. Ralph, Thomas Symul, and Ping Koy Lam
JTuC4 CLEO: Applications and Technology (CLEO:A&T) 2011