2021
DOI: 10.1103/prxquantum.2.030338
|View full text |Cite
|
Sign up to set email alerts
|

Multiphoton and Side-Channel Attacks in Mistrustful Quantum Cryptography

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
18
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

4
2

Authors

Journals

citations
Cited by 11 publications
(18 citation statements)
references
References 86 publications
0
18
0
Order By: Relevance
“…In order to counter multi-photon attacks 53 , in which B sends and tracks multi-photon pulses to obtain information about the measurement bases of A, and guarantee privacy, A must carefully choose how to report multiple clicks to B, i.e., how to define successful measurements. For this reason, in the second step of our token schemes QT 1 and QT 2 with the photonic setups of Fig.…”
Section: For K ∈ [N]mentioning
confidence: 99%
See 4 more Smart Citations
“…In order to counter multi-photon attacks 53 , in which B sends and tracks multi-photon pulses to obtain information about the measurement bases of A, and guarantee privacy, A must carefully choose how to report multiple clicks to B, i.e., how to define successful measurements. For this reason, in the second step of our token schemes QT 1 and QT 2 with the photonic setups of Fig.…”
Section: For K ∈ [N]mentioning
confidence: 99%
“…As follows from straightforward extensions of Lemmas 1 and 12 of ref. 53 , assumption F (see Table 6) guarantees that these reporting strategies offer perfect protection against arbitrary multi-photon attacks (see Lemma 5 in Methods).…”
Section: For K ∈ [N]mentioning
confidence: 99%
See 3 more Smart Citations