Events

Filter by:

Limit to events where the title matches:
Limit to events where the first date of the event:
Date range
Limit to events where the first date of the event:
Limit to events where the type is one or more of:
Limit to events tagged with one or more of:
Limit to events where the audience is one or more of:

Hao Qin, Telecom ParisTech

We report a quantum hacking strategy on a Continuous-Variable (CV) Quantum Key Distribution (QKD) system by inserting an external light. In the implementations of CV QKD systems, transmitting openly local oscillator pulses is a potential vulnerability for an eavesdropper to launch side channel attacks. In this work, other than targeting on local oscillator, we concern two imperfections in a balanced homodyne detector used in CV QKD system: the imbalance in the beam splitter and the finite linear detection limit.

Monday, March 5, 2018 4:00 pm - 4:00 pm EST (GMT -05:00)

Deterministic Quantum Dense Coding Networks

Seminar featuring Titas Chanda, Harish-Chandra Research Institute

Emergence of quantum information science has led to a paradigm shift in communication systems. In the past couple of decades, quantum information processing tasks like quantum cryptography, dense coding, quantum teleportation etc. have been shown to have advantages over their classical counterparts and have also been successfully implemented in laboratories.

Thursday, March 8, 2018 4:00 pm - 4:00 pm EST (GMT -05:00)

Deterministic Quantum Dense Coding Networks

Titas Chanda, Harish-Chandra Research Institute

Emergence of quantum information science has led to a paradigm shift in communication systems. In the past couple of decades, quantum information processing tasks like quantum cryptography, dense coding, quantum teleportation etc. have been shown to have advantages over their classical counterparts and have also been successfully implemented in laboratories.

Tuesday, March 20, 2018 11:45 am - 11:45 am EDT (GMT -04:00)

Quantum Hacking after Measurement-Device-Independent Quantum Cryptography

Anqi Huang - IQC

Quantum key distribution (QKD) is able to achieve information-theoretic security in principle. However, in practice, imperfect devices threaten the security of quantum cryptographic systems. As a promising countermeasure against practical attacks, measurement-device-independent (MDI) QKD is immune to all detector side-channel attacks. Nevertheless, there are some limitations of the MDI QKD protocol. To overcome the technical limitations of MDI QKD, I scrutinized and evaluated other two countermeasures against imperfect detections.