Open Access
Issue
EPJ Web Conf.
Volume 360, 2026
1st International Conference on “Quantum Innovations for Computing and Knowledge Systems” (QUICK’26)
Article Number 01003
Number of page(s) 12
DOI https://doi.org/10.1051/epjconf/202636001003
Published online 23 March 2026
  1. C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proc. IEEE Int. Conf. Computers, Systems and Signal Processing, Bangalore, India, pp. 175–179, Dec. 1984. [Google Scholar]
  2. N. Lütkenhaus, “Security against individual attacks for realistic quantum key distribution,” Phys. Rev. A, vol. 61, no. 5, p. 052304, Apr. 2000. [Google Scholar]
  3. H.-K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Phys. Rev. Lett., vol. 94, no. 23, p. 230504, Jun. 2005. [3] [Google Scholar]
  4. V. Scarani, A. Acín, G. Ribordy, and N. Gisin, “Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations,” Phys. Rev. Lett., vol. 92, no. 5, p. 057901, Feb. 2004. [Google Scholar]
  5. W.-Y. Hwang, “Quantum key distribution with high loss: Toward global secure communication,” Phys. Rev. Lett., vol. 91, no. 5, p. 057901, Aug. 2003. [Google Scholar]
  6. D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, “Security of quantum key distribution with imperfect devices,” Quant. Inf. Comput., vol. 4, no. 5, pp. 325–360, Sep. 2004. C. Zhou, et al., “Photon-number splitting attack and countermeasures in practical quantum key distribution systems,” in Proc. IEEE Int. Conf. Communications (ICC), Kuala Lumpur, Malaysia, pp. 1–6, May 2016. [Online]. Available: https://ieeexplore.ieee.org/document/7456202 [Google Scholar]
  7. H. Y. Lo, M. Curty, and N. Lütkenhaus, “Physically realizable photon-number-splitting attacks against quantum key distribution,” Adv. Quantum Technol., vol. 6, no. 5, p. 2300437, May 2023. [Online]. Available: https://advanced.onlinelibrary.wiley.com/doi/full/10.1002/qute.202300437 [Google Scholar]
  8. D. Datta, “Quantum key distribution using decoy pulses to combat photon-number splitting: An event-by-event impairment enumeration approach,” Phys. Rev. Lett., vol. 135, no. 5, p. 050602, Jan. 2025. [Online]. Available: https://arxiv.org/abs/2501.18394[3] [Google Scholar]
  9. Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian, “Experimental decoy state quantum key distribution over 15 km,” Phys. Rev. Lett., vol. 96, no. 7, p. 070502, Feb. 2006. [3] [Google Scholar]
  10. M. Curty, F. Xu, W. Cui, C. C. W. Lim, K. Tamaki, and H.-K. Lo, “Finite-key analysis for measurement-device-independent quantum key distribution,” Nat. Commun., vol. 5, no. 3732, pp. 1– [10] 7, May 2014. [Google Scholar]
  11. A. S. Trushechkin, E. O. Kiktenko, D. A. Kronberg, and A. K. Fedorov, “Security of the decoy state method for quantum key distribution,” Phys. Usp., vol. 63, no. 11, pp. 1095–1121, Nov. 2020. [3] [Online]. Available: https://iopscience.iop.org/article/10.3367/UFNe.2020.11.038882/meta [Google Scholar]
  12. L. Zhang, et al., “Intensity tomography for decoy-state QKD with fluctuating sources,” in Proc. IEEE Int. Conf. Quantum Computing and Engineering (QCE), pp. 265–271, Feb. 2023. [Online]. Available: https://ieeexplore.ieee.org/document/10050030[3] [Google Scholar]
  13. R. Vernekar and G. Xavier, “Comparative performance of weak coherent sources and heralded single-photon sources in QKD under PNS and USD attacks,” Preprints.org, 2024. [Online]. Available: https://www.preprints.org/frontend/manuscript/7c99f6dc7b0118390ac26508f4ab4e58/download_pub[2][4] [Google Scholar]
  14. J. Brazaola-Vicario, et al., “Security vulnerabilities in commercial QKD implementations: A survey,” Optics Continuum, vol. 3, no. 8, pp. 1438–1462, Aug. 2024. [Online]. Available: https://opg.optica.org/optcon/fulltext.cfm?uri=optcon-3-8-1438&id=554427 [Google Scholar]
  15. G. Gras, “Security analysis of practical quantum technologies: QRNGs and QKD systems,” Ph.D. dissertation, Univ. Geneva, Switzerland, 2021. [Online]. Available: https://access.archive-ouverte.unige.ch/access/metadata/54243fbb-da09-46b6-8bae-2a30dab7672c/download M. Mafu, et al., “Loss-tolerant prepare-and-measure quantum key distribution,” Results Phys., vol. 25, p. 104309, Sep. 2021. [Online]. https://www.sciencedirect.com/science/article/pii/S24 68227621003094 [Google Scholar]
  16. T. Sasaki, Y. Yamamoto, and M. Koashi, “Practical quantum key distribution protocol without monitoring signal disturbance,” Nature, vol. 509, pp. 475–478, May 2014. [Google Scholar]
  17. F. Xu, X. Ma, Q. Zhang, H.-K. Lo, and J.-W. Pan, “Secure quantum key distribution with realistic devices,” Rev. Mod. Phys., vol. 92, no. 2, p. 025002, Apr. 2020. [Google Scholar]
  18. L. Wang, et al., “Realistic vulnerabilities of decoy-state quantum key distribution,” arXiv preprint, arXiv:2507.15446, Jul. 2025 [3] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.