Secure quantum key distribution with a subset of malicious devices
Abstract The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security, as, typically, neither end users nor QKD manufacturers can validate the integrity of every component of their QKD system in practice. One possible approach to re-establish the security...
Main Authors: | Víctor Zapatero, Marcos Curty |
---|---|
Format: | Article |
Language: | English |
Published: |
Nature Portfolio
2021-02-01
|
Series: | npj Quantum Information |
Online Access: | https://doi.org/10.1038/s41534-020-00358-y |
Similar Items
-
Security of quantum key distribution with intensity correlations
by: Víctor Zapatero, et al.
Published: (2021-12-01) -
Advances in device-independent quantum key distribution
by: Víctor Zapatero, et al.
Published: (2023-02-01) -
Finite-key security analysis for quantum key distribution with leaky sources
by: Weilong Wang, et al.
Published: (2018-01-01) -
Measurement-device-independent quantum key distribution with leaky sources
by: Weilong Wang, et al.
Published: (2021-01-01) -
Practical aspects of measurement-device-independent quantum key distribution
by: Feihu Xu, et al.
Published: (2013-01-01)