Showing 1 - 5 results of 5 for search '"loophole"', query time: 0.06s Refine Results
  1. 1

    Phase-Matching Quantum Key Distribution with Discrete Phase Randomization by Xiaoxu Zhang, Yang Wang, Musheng Jiang, Yifei Lu, Hongwei Li, Chun Zhou, Wansu Bao

    Published 2021-04-01
    “…However, the discrete phase randomization opens a loophole to threaten the actual security. In this paper, we first introduce the unambiguous state discrimination (USD) measurement and the photon-number-splitting (PNS) attack against PM-QKD with imperfect phase randomization. …”
    Get full text
    Article
  2. 2

    Practical Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Frequency Side Channels by Yi-Fei Lu, Mu-Sheng Jiang, Yang Wang, Xiao-Xu Zhang, Fan Liu, Chun Zhou, Hong-Wei Li, Shi-Biao Tang, Jia-Yong Wang, Wan-Su Bao

    Published 2021-10-01
    “…Based on this security loophole, we propose a side-channel attack, named the passive frequency-shift attack, on the imperfect implementation of the sending or not-sending (SNS) TF-QKD protocol. …”
    Get full text
    Article
  3. 3

    Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness by Xiao-Lei Jiang, Yang Wang, Yi-Fei Lu, Jia-Ji Li, Chun Zhou, Wan-Su Bao

    Published 2022-09-01
    “…Furthermore, our simulation results also show that SNS TF-QKD is more robust to the weak randomness loopholes than the BB84 protocol and the measurement-device-independent QKD (MDI-QKD). …”
    Get full text
    Article
  4. 4

    Security analysis of measurement-device-independent quantum conference key agreement with weak randomness by Xiao-Lei Jiang, Xiao-Lei Jiang, Yang Wang, Yang Wang, Yang Wang, Yi-Fei Lu, Yi-Fei Lu, Jia-Ji Li, Jia-Ji Li, Hai-Long Zhang, Hai-Long Zhang, Mu-Sheng Jiang, Mu-Sheng Jiang, Chun Zhou, Chun Zhou, Wan-Su Bao, Wan-Su Bao

    Published 2023-02-01
    “…Measurement-device-independent QCKA (MDI-QCKA) is an effective QCKA scheme, which closes all detection loopholes and greatly enhances QCKA’s security in practical application. …”
    Get full text
    Article
  5. 5

    Threshold Recognition of Water Turbidity for Clogging Prevention during Groundwater Recharge Using Secondary Effluent from Wastewater Treatment Plant by Shiwei Li, Siyue Wang, Shubin Zou, Yang Wang, Wei Fan, Dan Xiao

    Published 2023-02-01
    “…The recharge efficiency during artificial groundwater recharge (AGR) is reduced primarily by clogging that is triggered by suspended particles. However, there are loopholes in the current standards of recharge-water quality for clogging control during AGR, and the threshold values of turbidity to prevent clogging have not been reasonably determined. …”
    Get full text
    Article