Acta Optica Sinica, Volume. 35, Issue 2, 227001(2015)

Optimal Solution of Phase-Remapping Attack

Han Baoyuan1、* and Kong Xiangjin2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    References(20)

    [1] [1] Shen Zeyuan, Fang Jian, He Guangqiang, et al.. Synchronous scheme and experimental realization in continuous variable quautum key distribution system [J]. Chinese J Lasers, 2013, 40(3): 0305004.

    [2] [2] Haibin Du, Yan Liang, Shengxiang Zhang, et al.. Practical high-speed light source for decoy-state quantum key distribution [J]. Chin Opt Lett, 2014, 12(7): 072702.

    [3] [3] Wang Yunyan, Guo Dabo, Zhang Yanhuang, et al.. Algorithm of multidimensional reconciliation for continuous-variable quantum key distribution [J]. Acta Optica Sinica, 2014, 34(8): 0827002.

    [4] [4] Michel Boyer, Ran Gelles, Tal Mor. Attacks on fixed-apparatus quantum-key-distribution schemes [J]. Phys Rev A, 2014, 90(1): 012329.

    [5] [5] W T Buttler, R J Hughes, S K Lamoreaux, et al.. Daylight quantum key distribution over 1.6 km [J]. Phys Rev Lett, 2000, 84(24): 5652-5655.

    [6] [6] C Kuresiefer, P Zarda, M Halder, et al.. A step towards global key distribution [J]. Nature, 2002, 419: 450.

    [7] [7] Huang Jianhua, Wu Guang, Zeng Heping. Study of 1.5 GHz harmonics ultrashort pulse gated InGaAs/InP avalanche photodiode single-photon detection [J]. Acta Optica Sinica, 2014, 34(2): 0204001.

    [8] [8] Guo Xueshi, Gao Kang, Liu Nannan, et al.. Differential detection system for measuring the quantum noise of pulsed light [J]. Acta Optica Sinica, 2013, 33(9): 0927002.

    [9] [9] Feng Tang, Bing Zhu. Scintillation discriminator improves free-space quantum key distribution [J]. Chin Opt Lett, 2013, 11(9): 090101.

    [10] [10] A Rubenok, J A Slater, P Chan, et al.. Real- world two- photon interference and proof- of- principle quantum key distribution immune to detector attacks [J]. Phys Rev Lett, 2013, 111(13): 130501.

    [11] [11] Normand J Beaudry, Marco Lucamarini, Stefano Mancini, et al.. Security of two-way quantum key distribution [J]. Phys Rev A, 2013, 88(6): 062302.

    [12] [12] Miloslav Dusek, Ondrej Haderka, Martin Hendrych, et al.. Quantum identification system [J]. Phys Rev A, 1999, 60(1): 149-156.

    [13] [13] Gilles Brassard, Norbert Lütkenhaus, Tal Mor, et al.. Limitations on practical quantum cryptography [J]. Phys Rev Lett, 2000, 85(6): 1330-1333.

    [14] [14] Vadim Makarov, Andrey Anisimov, Johannes Skaar. Effects of detector efficiency mismatch on security of quantum cryptosystems [J]. Phys Rev A , 2006, 74(2): 022313.

    [15] [15] Vadim Makarov. Controlling passively quenched single photon detectors by bright light [J]. New J Phys, 2009, 11(6): 065003.

    [16] [16] L Lydersen, C Wiechers, C Wittmann, et al.. Hacking commercial quantum cryptography systems by tailored bright illumination [J]. Nat Photonics , 2010, 4(10): 686-689.

    [17] [17] Francesco Buscemi, Michael J W Hall, Masanao Ozawa, et al.. Noise and disturbance in quantum measurements: An informationtheoretic approach [J]. Phys Rev Lett, 2014, 112(5): 050401.

    [18] [18] Fabio Grazioso, Frederic Grosshans. Quantum- key- distribution protocols without sifting that are resistant to photon- numbersplitting attacks [J]. Phys Rev A, 2013, 88(5): 052302.

    [19] [19] A Muller, T Herzog, B Huttner, et al..“Plug and play”systems for quantum cryptography [J]. Appl Phys Lett, 1997, 70(7): 793-795.

    [20] [20] Chi-Hang Fred Fung, Bing Qi, Kiyoshi Tamaki, et al.. Phase-remapping attack in practical quantum-key-distribution systems [J]. Phys Rev A, 2007, 75(3): 032314.

    Tools

    Get Citation

    Copy Citation Text

    Han Baoyuan, Kong Xiangjin. Optimal Solution of Phase-Remapping Attack[J]. Acta Optica Sinica, 2015, 35(2): 227001

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Quantum Optics

    Received: Jul. 29, 2014

    Accepted: --

    Published Online: Jan. 19, 2015

    The Author Email: Baoyuan Han (814630287@qq.com)

    DOI:10.31788/aos201535.0227001

    Topics