Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution
As the existence of non-zero reflection coefficients in the real component of continuous-variable quantum key distribution (CV-QKD) systems, Eve can probe the system by sending the bright light pulses into Alice’s set-up. With the analysis of back-reflections, Eve only takes a few back-reflected pho...
Príomhchruthaitheoirí: | , , |
---|---|
Formáid: | Alt |
Teanga: | English |
Foilsithe / Cruthaithe: |
MDPI AG
2020-11-01
|
Sraith: | Applied Sciences |
Ábhair: | |
Rochtain ar líne: | https://www.mdpi.com/2076-3417/10/21/7788 |