2018
DOI: 10.1364/osac.1.001079
|View full text |Cite
|
Sign up to set email alerts
|

Zero-error attacks on a quantum key distribution FSO system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(17 citation statements)
references
References 21 publications
0
17
0
Order By: Relevance
“…• If the legitimate receiver only wants to improve its received power (without taking the eavesdropper into account) in the σ 2 V = σ 2 H case, the optimal G D can be found by (10), which depends on the parameter setting, i.e., may not just make G D as large as possible (shown in Fig. 1).…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…• If the legitimate receiver only wants to improve its received power (without taking the eavesdropper into account) in the σ 2 V = σ 2 H case, the optimal G D can be found by (10), which depends on the parameter setting, i.e., may not just make G D as large as possible (shown in Fig. 1).…”
Section: Discussionmentioning
confidence: 99%
“…The pointing error angle (θ) at D can be divided into two parts, i.e., θ = θ 2 V + θ 2 H , where θ H and θ V are the azimuth and elevation pointing error angles, respectively. Like in [10], we assume that θ H and θ V are Gaussian random variables (RVs). However, we consider the general case in which these RVs are not necessarily with zero mean and the same variance.…”
Section: System Modelmentioning
confidence: 99%
See 3 more Smart Citations