Invisible Trojan-horse attack
Abstract We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack perform...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Nature Publishing Group
2017-08-01
|
Series: | Scientific Reports |
Online Access: | https://doi.org/10.1038/s41598-017-08279-1 |