• Chinese Journal of Quantum Electronics
  • Vol. 40, Issue 1, 95 (2023)
Shibiao TANG1、*, Zhi LI2, Weijun ZHENG3, Wansheng ZHANG4, Song GAO1, Yalin LI1, Jie CHENG1, and Lianjun JIANG1
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • 4[in Chinese]
  • show less
    DOI: 10.3969/j.issn.1007-5461.2023.01.011 Cite this Article
    TANG Shibiao, LI Zhi, ZHENG Weijun, ZHANG Wansheng, GAO Song, LI Yalin, CHENG Jie, JIANG Lianjun. Research on anti-dead time attack scheme for quantum key distribution system[J]. Chinese Journal of Quantum Electronics, 2023, 40(1): 95 Copy Citation Text show less
    References

    [1] Arute F, Arya K, Babbush R, et al. Quantum supremacy using a programmable superconducting processor [J]. Nature, 2019, 574(7779): 505-510.

    [2] Zhong H S, Wang H, Deng Y H, et al. Quantum computational advantage using photons [J]. Science, 2020, 370(6523): 1460-1463.

    [3] Yin H L, Chen T Y, Yu Z W, et al. Measurement-device-independent quantum key distribution over a 404 km optical fiber [J]. Physical Review Letters, 2016, 117(19): 190501.

    [4] Liao S K, Cai W Q, Handsteiner J, et al. Satellite-relayed intercontinental quantum network [J]. Physical Review Letters, 2018, 120(3): 030501.

    [6] Xu F H, Ma X F, Zhang Q, et al. Secure quantum key distribution with realistic devices [J]. Reviews of Modern Physics, 2020, 92(2): 025002.

    [7] Ma Y Y, Jia G T, Liu Y, et al. Security of quantum key distribution with wavelength attack [J]. Chinese Journal of Quantum Electronics, 2019, 3(3): 342-347.

    [8] Wang X B. Beating the photon-number-splitting attack in practical quantum cryptography [J]. Physical Review Letters, 2005, 94(23): 230503.

    [9] Zhou F, Wang X B. Practical technology of quantum communication [J]. Journal of Information Security Research, 2017, 3(1): 80-85.

    [10] Rogers D J, Bienfang J C, Nakassis A, et al. Detector dead-time effects and paralyzability in high-speed quantum key distribution [J]. New Journal of Physics, 2007, 9(9): 319.

    [11] Burenkov V, Qi B, Fortescue B, et al. Security of high speed quantum key distribution with finite detector dead time [J]. Quantum Information and Computation, 2014, 14(3,4): 217-235.

    [12] Weier H N, Krauss H, Rau M, et al. Quantum eavesdropping without interception: An attack exploiting the dead time of single-photon detectors [J]. New Journal of Physics, 2011, 13(7): 073024.

    [13] Liu H. Some Asymmetric Issues in Practical Quantum Key Distribution System [D]. Hefei: University of Science and Technology of China, 2020.

    [14] Xie H B. The Research of Key Technology for Free-space High-speed Real-time Quantum Key Distribution [D]. Hefei: University of Science and Technology of China, 2019.

    TANG Shibiao, LI Zhi, ZHENG Weijun, ZHANG Wansheng, GAO Song, LI Yalin, CHENG Jie, JIANG Lianjun. Research on anti-dead time attack scheme for quantum key distribution system[J]. Chinese Journal of Quantum Electronics, 2023, 40(1): 95
    Download Citation