• Laser & Optoelectronics Progress
  • Vol. 53, Issue 7, 72701 (2016)
Chen Junjia1、2、*, Wang Jindong1、2, Qin Xiaojuan3, Zhao Feng4, Wei Zhengjun1、2, and Zhang Zhiming1、2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • 4[in Chinese]
  • show less
    DOI: 10.3788/lop53.072701 Cite this Article Set citation alerts
    Chen Junjia, Wang Jindong, Qin Xiaojuan, Zhao Feng, Wei Zhengjun, Zhang Zhiming. Nonlinear Active Phase Compensation Attack Based on Multiple Operators for Measurement[J]. Laser & Optoelectronics Progress, 2016, 53(7): 72701 Copy Citation Text show less
    References

    [1] Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing[C]. International Conference on Computers Systems and Signal Processing, IEEE, 1984: 175-179.

    [2] Bennett C H, Bessette F, Brassard G, et al.. Experiment quantum cryptography[J]. Journal of Cryptology, 1992, 5(1): 3-28.

    [3] Stucki D, Gisin N, Guinnard O, et al.. Quantum key distribution over 67 km with a plug & play system[J]. New Journal of Physics, 2002, 4(1): 41.

    [4] Gobby C, Yuan Z L, Shields A J. Quantum key distribution over 122 km of standard telecom fiber[J]. Applied Physics Letters, 2004, 84(19): 3762-3764.

    [5] Mo X F, Zhu B, Han Z F, et al.. Faraday-Michelson system for quantum cryptography[J]. Optics Letters, 2005, 30(19): 2632-2634.

    [6] Chen Yan, Shen Yong, Zou Hongxin. An all-fiber continuous variable quantum key distribution based on multi-bits coding of single pulse[J]. Acta Optica Sinica, 2015, 35(7): 0727001.

    [7] Liu Youming,Wang Chao, Huang Duan, et al.. Study of synchronous technology in high-speed continuous variable quantum key distribution system[J]. Acta Optica Sinica, 2015, 35(1): 0106006.

    [8] Guo Dabo, Zhang Yanhuang, Wang Yunyan. Performance optimization for the reconciliation of Gaussian quantum key distribution[J]. Acta Optica Sinica, 2014, 34(1): 0127001.

    [9] Wang X B. Beating the photon-number-splitting attack in practical quantum cryptography[J]. Physical Review Letters, 2005, 94(23): 230503.

    [10] Brassard G, Lütkenhaus N, Mor T, et al.. Limitations on practical quantum cryptography[J]. Physical Review Letters, 2000, 85(6): 1330-1333.

    [11] Vakhitov A, Makarov V, Hjelme D R. Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography[J]. Journal of Modern Optics, 2001, 48(13): 2023-2038.

    [12] Fung C H F, Qi B, Tamaki K, et al.. Phase-remapping attack in practical quantum-key-distribution systems[J]. Physical Review A, 2007, 75(3): 032314.

    [13] Makarov V, Anisimov A, Skaar J. Effects of detector efficiency mismatch on security of quantum cryptosystems[J]. Physical Review A, 2005, 74(2): 022313.

    [14] Qi B, Fung C H F, Lo H K, et al.. Time-shift attack in practical quantum cryptosystems[J]. Quantum Information & Computation, 2005, 7(1): 73-82.

    [15] Lydersen L, Wiechers C, Wittmann C, et al.. Hacking commercial quantum cryptography systems by tailored bright illumination[J]. Nature Photonics, 2010, 4(10): 686-689.

    [16] Dong Z Y, Yu N N, Wei Z J, et al.. An attack aimed at active phase compensation in one-way phase-encoded QKD systems[J]. The European Physical Journal D, 2014, 68(8): 1-6.

    [17] Makarov V, Brylevski A, Hjelme D R. Real-time phase tracking in single-photon interferometers[J]. Applied Optics, 2004, 43(22): 4385-4392.

    [18] Zhang L J, Wang Y G, Yin Z Q, et al.. Real-time compensation of phase drift for phase-encoded quantum key distribution systems[J]. Chinese Science Bulletin, 2011, 56(22): 2305-2311.

    [19] Chen W, Hang Z F, Mo X F, et al.. Active phase compensation of quantum key distribution system[J]. Chinese Science Bulletin, 2008, 53(9): 1310-1314.

    [20] Yue Yuying, Du Guangbin, Liu Xingxiang. Eigenvalues and eigenvectors of the weak adjoint matrix and m-weak adjoint matrix[J]. Journal of Yanan University (Natural Science Edition), 2011, 30(3): 39-41.

    [21] Chen Huiru. The discriminances and applications of the infinitesimal and infinitely sequence of number[J]. Journal of Chaohu College, 2010, 12(6): 116-118.

    Chen Junjia, Wang Jindong, Qin Xiaojuan, Zhao Feng, Wei Zhengjun, Zhang Zhiming. Nonlinear Active Phase Compensation Attack Based on Multiple Operators for Measurement[J]. Laser & Optoelectronics Progress, 2016, 53(7): 72701
    Download Citation