Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Poompong Chaiwongkhot"'
Autor:
Shihan Sajeed, Poompong Chaiwongkhot, Anqi Huang, Hao Qin, Vladimir Egorov, Anton Kozubov, Andrei Gaidash, Vladimir Chistiakov, Artur Vasiliev, Artur Gleim, Vadim Makarov
Publikováno v:
Scientific Reports, Vol 11, Iss 1, Pp 1-16 (2021)
Abstract Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication syste
Externí odkaz:
https://doaj.org/article/e530a5d77c29476d9ae10003ca3d2767
Autor:
Anastasiya Ponosova, Daria Ruzhitskaya, Poompong Chaiwongkhot, Vladimir Egorov, Vadim Makarov, Anqi Huang
Publikováno v:
PRX Quantum, Vol 3, Iss 4, p 040307 (2022)
A well-protected and characterized source in a quantum key distribution system is needed for its security. Unfortunately, the source is vulnerable to light-injection attacks, such as Trojan-horse, laser-seeding, and laser-damage attacks, in which an
Externí odkaz:
https://doaj.org/article/acb5279989a74165926ecac7cb65aa57
Publikováno v:
EPJ Quantum Technology. 9
We study potential security vulnerabilities of a single-photon detector based on superconducting transition-edge sensor. In a simple experiment, we show that an adversary could fake a photon number result at a certain wavelength by sending a larger n
Autor:
Hao Qin, Vladimir Chistiakov, Andrei Gaidash, V. I. Egorov, Artur Vasiliev, Anton Kozubov, Poompong Chaiwongkhot, Vadim Makarov, Shihan Sajeed, A. V. Gleim, Anqi Huang
Publikováno v:
Scientific Reports, Vol 11, Iss 1, Pp 1-16 (2021)
Scientific Reports
Scientific Reports
Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The p
Autor:
Kullapha Chaiwongkhot, David Ruffolo, Poompong Chaiwongkhot, Alejandro Sáiz, Chanoknan Banglieng
Neutron monitors were designed to measure atmospheric secondary neutrons from cosmic ray showers in order to track the cosmic ray flux vs. time. Furthermore, at the Princess Sirindhorn Neutron Monitor (PSNM), an 18-counter NM64 detector at 2560-m alt
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1605e3acbdb25116e4d0d0de8a1dbcdb
https://doi.org/10.5194/egusphere-egu22-5650
https://doi.org/10.5194/egusphere-egu22-5650
Autor:
Anqi Huang, Jean-Philippe Bourgoin, Thomas Jennewein, Poompong Chaiwongkhot, Yanbao Zhang, Vadim Makarov, Shihan Sajeed, Katanya B. Kuntz, Norbert Lütkenhaus
Publikováno v:
Physical Review A. 99
The ability of an eavesdropper (Eve) to perform an intercept-resend attack on a free-space quantum key distribution (QKD) receiver by precisely controlling the incidence angle of an attack laser has been previously demonstrated. However, such an atta
Autor:
Anqi Huang, Shi-Hai Sun, Vadim Makarov, Álvaro Navarrete, Poompong Chaiwongkhot, Marcos Curty
Publikováno v:
Investigo. Repositorio Institucional de la Universidade de Vigo
Universidade de Vigo (UVigo)
Universidade de Vigo (UVigo)
Quantum key distribution (QKD) based on the laws of quantum physics allows the secure distribution of secret keys over an insecure channel. Unfortunately, imperfect implementations of QKD compromise its information-theoretical security. Measurement-d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::698f3b4d080155274830c6032a02c837
http://arxiv.org/abs/1902.09792
http://arxiv.org/abs/1902.09792
Autor:
Matthieu Legre, Mathilde Soucarros, Anqi Huang, Poompong Chaiwongkhot, Shihan Sajeed, Vadim Makarov
Publikováno v:
IEEE Journal of Quantum Electronics. 52:1-11
In the last decade, efforts have been made to reconcile theoretical security with realistic imperfect implementations of quantum key distribution (QKD). Implementable countermeasures are proposed to patch the discovered loopholes. However, certain co
Autor:
Vadim Makarov, Poompong Chaiwongkhot, Shihan Sajeed, Paulo Vinicius Pereira Pinheiro, Jean-Philippe Bourgoin, Thomas Jennewein, Rolf T. Horn, Norbert Lütkenhaus
Publikováno v:
Optics express. 26(16)
Quantum key distribution (QKD) promises information theoretic secure key as long as the device performs as assumed in the theoretical model. One of the assumptions is an absence of information leakage about individual photon detection outcomes of the
A security evaluation against the finite-key-size effect was performed for a commercial plug-and-play quantum key distribution (QKD) system. We demonstrate the ability of an eavesdropper to force the system to distill key from a smaller length of sif
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1d321facf56da0e63a0fa5439c78dfd1
http://arxiv.org/abs/1610.06876
http://arxiv.org/abs/1610.06876