Monitoring the intercept-resend attack with the weak measurement model
HW Li, ZM Xu, ZQ Yin - Quantum Information Processing, 2018 - Springer
HW Li, ZM Xu, ZQ Yin
Quantum Information Processing, 2018•SpringerUnconditional security of the quantum key distribution protocol has been proved, but the
practical quantum key distribution system may be attacked by utilizing imperfect state
preparation and measurement devices. To improve security of the practical quantum key
distribution system, we propose the weak measurement model to monitor the intercept-
resend eavesdropping strategy in the quantum channel, where the detector-blinding attack
and the wavelength attack can be observed through the quantum bit error rate value in the …
practical quantum key distribution system may be attacked by utilizing imperfect state
preparation and measurement devices. To improve security of the practical quantum key
distribution system, we propose the weak measurement model to monitor the intercept-
resend eavesdropping strategy in the quantum channel, where the detector-blinding attack
and the wavelength attack can be observed through the quantum bit error rate value in the …
Abstract
Unconditional security of the quantum key distribution protocol has been proved, but the practical quantum key distribution system may be attacked by utilizing imperfect state preparation and measurement devices. To improve security of the practical quantum key distribution system, we propose the weak measurement model to monitor the intercept-resend eavesdropping strategy in the quantum channel, where the detector-blinding attack and the wavelength attack can be observed through the quantum bit error rate value in the weak measurement model.
Springer
Showing the best result for this search. See all results