Cargando…

Invisible Trojan-horse attack

We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance agai...

Descripción completa

Detalles Bibliográficos
Autores principales: Sajeed, Shihan, Minshull, Carter, Jain, Nitin, Makarov, Vadim
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5566943/
https://www.ncbi.nlm.nih.gov/pubmed/28827553
http://dx.doi.org/10.1038/s41598-017-08279-1