Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
1860585 | Physics Letters A | 2016 | 4 Pages |
Abstract
There has been much interest in “counterfactual quantum cryptography” (T.-G. Noh, 2009 [10]). It seems that the counterfactual quantum key distribution protocol without any photon carrier through the quantum channel provides practical security advantages. However, we show that it is easy to break counterfactual quantum key distribution systems in practical situations. We introduce the two types of Trojan horse attacks that are available for the two-way protocol and become possible for practical counterfactual systems with our eavesdropping schemes.
Keywords
Related Topics
Physical Sciences and Engineering
Physics and Astronomy
Physics and Astronomy (General)
Authors
Xiuqing Yang, Kejin Wei, Haiqiang Ma, Shihai Sun, Yungang Du, Lingan Wu,