Notice, by using this platform, you agree to the Terms of Use and Privacy Policy.
Passive Quantum Communication Transmitters
Passive transmitters using a linear optics network and post-selection offer intrinsic immunity against specific attacks like Trojan Horse Attacks (THA).
Literature
[Curty2010] | Marcos Curty, Xiongfeng Ma, Bing Qi, and Tobias Moroder. "Passive decoy-state quantum key distribution with practical light sources" In: Physical Review A 81, 022310. (2010) 10.1103/PhysRevA.81.022310. |
[Curty2010a] | Marcos Curty, Xiongfeng Ma, Hoi-Kwong Lo, and Norbert Lutkenhaus. "Passive sources for the Bennett-Brassard 1984 quantum-key-distribution protocol with practical signals" In: Phys. Rev. A, 82, 052325. (2010) 10.1103/PhysRevA.82.052325. |