
AbstractQuantum key distribution (QKD) is intended to produce cryptographic secret keys between two remote parties, usually called Alice and Bob. Even though QKD has been proven to be unconditionally secure against the eavesdropper, commonly called Eve, practical implementations of QKD may contain vulnerabilities that may lead to the generated secret keys being compromised. In order to detect the presence of the eavesdropper in the channel, in our proposal Alice introduces an interleaved sequence of decoy states which produce a characteristic distribution at Bob's station. Thus, in analyzing such distribution in presence and absence of the eavesdropper Eve, her activity in the channel is detected. This protocol doesn’t require changes at the quantum physical level, but it can be incorporated at the high software level.
Quantum cryptography, loophole detector attack, quantum key distribution, decoy states
Quantum cryptography, loophole detector attack, quantum key distribution, decoy states
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 8 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
