English
 
Help Privacy Policy Disclaimer
  Advanced SearchBrowse

Item

ITEM ACTIONSEXPORT

Released

Conference Paper

Quantum hacking of continuous-variable quantum key distribution systems: realtime Trojan-horse attacks

MPS-Authors
/persons/resource/persons201204

Stiller,  B.
Quantum Information Processing, Leuchs Division, Max Planck Institute for the Science of Light, Max Planck Society;

/persons/resource/persons201106

Khan,  I.
Quantum Information Processing, Leuchs Division, Max Planck Institute for the Science of Light, Max Planck Society;

/persons/resource/persons201098

Jain,  N.
Quantum Information Processing, Leuchs Division, Max Planck Institute for the Science of Light, Max Planck Society;

/persons/resource/persons201126

Marquardt,  Ch.
Quantum Information Processing, Leuchs Division, Max Planck Institute for the Science of Light, Max Planck Society;

/persons/resource/persons201115

Leuchs,  G.
Leuchs Division, Max Planck Institute for the Science of Light, Max Planck Society;

External Resource
No external resources are shared
Fulltext (restricted access)
There are currently no full texts shared for your IP range.
Fulltext (public)
There are no public fulltexts stored in PuRe
Supplementary Material (public)
There is no public supplementary material available
Citation

Stiller, B., Khan, I., Jain, N., Jouguet, P., Kunz-Jacques, S., Diamanti, E., et al. (2015). Quantum hacking of continuous-variable quantum key distribution systems: realtime Trojan-horse attacks. In 2015 CONFERENCE ON LASERS AND ELECTRO-OPTICS (CLEO). 345 E 47TH ST, NEW YORK, NY 10017 USA: IEEE.


Cite as: https://hdl.handle.net/11858/00-001M-0000-002D-6442-D
Abstract
We experimentally demonstrate successful Trojan-horse attacks on laboratory and commercial continuous-variable quantum key distribution systems with binary and Gaussian modulation. Furthermore, we analyze appropriate countermeasures regarding their spectral performance. (C) 2014 Optical Society of America