2012
DOI: 10.1103/physrevlett.108.130502
|View full text |Cite
|
Sign up to set email alerts
|

Side-Channel-Free Quantum Key Distribution

Abstract: Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the relevant detectors and settings inside private spaces inaccessible while simultaneously acting as a Hilbert space filter … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
479
0
3

Year Published

2012
2012
2021
2021

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 616 publications
(482 citation statements)
references
References 26 publications
0
479
0
3
Order By: Relevance
“…Recently, Lo, Curty, and Qi proposed an MDI-QKD scheme [36] that is able to essentially avoid random bit assignments, hence going beyond the 50% efficiency limit [20]. By relying on entanglement swapping techniques [37] and reverse EPR schemes [38], the MDI-QKD scheme [20] (see also [39]) can achieve similar performance to traditional QKD systems, while shielding out detection loopholes.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, Lo, Curty, and Qi proposed an MDI-QKD scheme [36] that is able to essentially avoid random bit assignments, hence going beyond the 50% efficiency limit [20]. By relying on entanglement swapping techniques [37] and reverse EPR schemes [38], the MDI-QKD scheme [20] (see also [39]) can achieve similar performance to traditional QKD systems, while shielding out detection loopholes.…”
Section: Introductionmentioning
confidence: 99%
“…A theoretical protocol developed for quantum sensor networks can be found (Nagy et al, 2010). Practical implementations with theoretical security proofs have been presented in (Braunstein and Pirandola, 2012;Lo et al, 2012). The protocol presented here will use entanglement swapping, but exhibits basic different features.…”
Section: Introductionmentioning
confidence: 99%
“…Examples of such schemes are distribution of entangled photon pairs to end users, where local measurements are performed, 9 or conversely, where photons are sent by two users to be projected into a Bell state by an intermediate quantum node. [10][11][12] Photonic quantum repeaters 13 and relays 8 use both of these effects to teleport entangled or single qubits, respectively, in a manner that can be chained to create a fully quantum network for which theoretically proven quantum security can be preserved.…”
Section: Introductionmentioning
confidence: 99%