Oct. 28, 2022, 1:24 a.m. | Jie Gu, Xiao-Yu Cao, Yao Fu, Zong-Wu He, Ze-Jie Yin, Hua-Lei Yin, Zeng-Bing Chen

cs.CR updates on arXiv.org arxiv.org

The security of quantum key distribution (QKD) is severely threatened by
discrepancies between realistic devices and theoretical assumptions. Recently,
a significant framework called the reference technique was proposed to provide
security against arbitrary source flaws under current technology such as state
preparation flaws, side channels caused by mode dependencies, the Trojan horse
atttacks and pulse correlations. Here, we adopt the reference technique to
prove security of an efficient four-phase measurement-device-independent QKD
using laser pulses against potential source imperfections. We present …

device distribution key measurement quantum quantum key distribution

Enterprise Threat Intel Analyst

@ Resource Management Concepts, Inc. | Quantico, Virginia, United States

IT Security Engineer III

@ Mitsubishi Heavy Industries | Houston, TX, US, 77046

Cyber Intelligence Vice President, Threat Intelligence

@ JPMorgan Chase & Co. | Singapore, Singapore

Assistant Manager, Digital Forensics

@ Interpath Advisory | Manchester, England, United Kingdom

Tier 3 - Forensic Analyst, SME

@ Resource Management Concepts, Inc. | Quantico, Virginia, United States

Incident Response, SME

@ Resource Management Concepts, Inc. | Quantico, Virginia, United States