Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Shihan Sajeed"'
Autor:
Shihan Sajeed, Thomas Jennewein
Publikováno v:
Light: Science & Applications, Vol 10, Iss 1, Pp 1-9 (2021)
Abstract Quantum channels in free-space, an essential prerequisite for fundamental tests of quantum mechanics and quantum technologies in open space, have so far been based on direct line-of-sight because the predominant approaches for photon-encodin
Externí odkaz:
https://doaj.org/article/119cb07e5e9b41c090efde093e3107be
Autor:
Shihan Sajeed, Poompong Chaiwongkhot, Anqi Huang, Hao Qin, Vladimir Egorov, Anton Kozubov, Andrei Gaidash, Vladimir Chistiakov, Artur Vasiliev, Artur Gleim, Vadim Makarov
Publikováno v:
Scientific Reports, Vol 11, Iss 1, Pp 1-16 (2021)
Abstract Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication syste
Externí odkaz:
https://doaj.org/article/e530a5d77c29476d9ae10003ca3d2767
Publikováno v:
PLoS ONE, Vol 15, Iss 8, p e0236630 (2020)
Quantum cryptography promises security based on the laws of physics with proofs of security against attackers of unlimited computational power. However, deviations from the original assumptions allow quantum hackers to compromise the system. We prese
Externí odkaz:
https://doaj.org/article/aa11aa83a1c64cf6b5b78600c19ddf64
Publikováno v:
PLoS ONE, Vol 15, Iss 12, p e0244010 (2020)
[This corrects the article DOI: 10.1371/journal.pone.0236630.].
Externí odkaz:
https://doaj.org/article/2db6f306093642e18a9438ca012aaadd
Publikováno v:
Scientific Reports, Vol 7, Iss 1, Pp 1-7 (2017)
Abstract We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a d
Externí odkaz:
https://doaj.org/article/24b1b175064541328a6c4967e78d5d01
Publikováno v:
2023 IEEE International Conference on Consumer Electronics (ICCE).
Autor:
Hao Qin, Vladimir Chistiakov, Andrei Gaidash, V. I. Egorov, Artur Vasiliev, Anton Kozubov, Poompong Chaiwongkhot, Vadim Makarov, Shihan Sajeed, A. V. Gleim, Anqi Huang
Publikováno v:
Scientific Reports, Vol 11, Iss 1, Pp 1-16 (2021)
Scientific Reports
Scientific Reports
Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present a security evaluation and improvement protocol for complete quantum communication systems. The p
Publikováno v:
Scientific Reports
Scientific Reports, Vol 10, Iss 1, Pp 1-8 (2020)
Scientific Reports, Vol 10, Iss 1, Pp 1-8 (2020)
It is well-known that no local model - in theory - can simulate the outcome statistics of a Bell-type experiment as long as the detection efficiency is higher than a threshold value. For the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality this theo
Publikováno v:
PLoS ONE, Vol 15, Iss 12, p e0244010 (2020)
[This corrects the article DOI: 10.1371/journal.pone.0236630.].
Autor:
M. A. Ruhul Fatin, Shihan Sajeed
Publikováno v:
Optics Express. 29:16073
The ability of an eavesdropper to compromise the security of a quantum communication system by changing the angle of the incoming light is well-known. Randomizing the role of the detectors has been proposed to be an efficient countermeasure to this t