Cargando…
Experimental vulnerability analysis of QKD based on attack ratings
Inspired by the methodology used for classical cryptographic hardware, we consider the use of attack ratings in the context of QKD security evaluation. To illustrate the relevance of this approach, we conduct an experimental vulnerability assessment of CV-QKD against saturation attacks, for two diff...
Autores principales: | Kumar, Rupesh, Mazzoncini, Francesco, Qin, Hao, Alléaume, Romain |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8100156/ https://www.ncbi.nlm.nih.gov/pubmed/33953211 http://dx.doi.org/10.1038/s41598-021-87574-4 |
Ejemplares similares
-
QKD Based on Symmetric Entangled Bernstein-Vazirani
por: Ampatzis, Michael, et al.
Publicado: (2021) -
Application and Development of QKD-Based Quantum Secure Communication
por: Lai, Junsen, et al.
Publicado: (2023) -
On the security of semi-device-independent QKD protocols
por: Chaturvedi, Anubhav, et al.
Publicado: (2018) -
Composable security of CV-MDI-QKD with secret key rate and data processing
por: Papanastasiou, Panagiotis, et al.
Publicado: (2023) -
How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack?
por: Pavičić, Mladen
Publicado: (2021)