Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication in quantum key distribution. Phys. Rev. A 62(2), 022305 (2000)
ADS
Article
Google Scholar
Zhou, N., Zeng, G., Zeng, W., Zhu, F.: Cross-center quantum identification scheme based on teleportation and entanglement swapping. Opt. Commun. 254(4–6), 380–388 (2005)
ADS
Article
Google Scholar
Shi, W.-M., Zhou, Y.-H., Yang, Y.-G.: Quantum deniable authentication protocol. Quantum Inf. Process. 13(7), 1501–1510 (2014)
ADS
MathSciNet
Article
Google Scholar
Kang, M.-S., Hong, C.-H., Heo, J., Lim, J.-I., Yang, H.-J.: Controlled mutual quantum entity authentication using entanglement swapping. Chin. Phys. B 24(9), 090306 (2015)
Article
Google Scholar
Huang, W., Xu, B.-J., Duan, J.-T., Liu, B., Su, Q., He, Y.-H., Jia, H.-Y.: Authenticated quantum key distribution with collective detection using single photons. Int. J. Theor. Phys. 55(10), 4238–4256 (2016)
Article
Google Scholar
Hong, C.-h, Heo, J., Jang, J.-G., Kwon, D.: Quantum identity authentication with single photon. Quantum Inf. Process. 16(10), 236 (2017)
ADS
MathSciNet
Article
Google Scholar
Kang, M.-S., Heo, J., Hong, C.-h, Yang, H.-J., Han, S.-W., Moon, S.: Controlled mutual quantum entity authentication with an untrusted third party. Quantum Inf. Process. 17(7), 159 (2018)
ADS
MathSciNet
Article
Google Scholar
Wang, Q., Zhang, S., Wang, S.-l, Shi, R.-h: Comment on “controlled mutual quantum entity authentication with an untrusted third party.” Quantum Inf. Process. 19(4), 125 (2020)
ADS
MathSciNet
Article
Google Scholar
Kang, M.-S., Heo, J., Hong, C.-h, Yang, H.-J., Han, M.S., Moon, S., Han, S.-W.: Response to “comment on ‘controlled mutual quantum entity authentication with an untrusted third party.’” Quantum Inf. Process. 19(4), 124 (2020)
ADS
MathSciNet
Article
Google Scholar
Choi, J.-W., Kang, M.-S., Heo, J., Hong, C.-h, Yoon, C.-S., Han, S.-W., Moon, S., Yang, H.-J.: Quantum challenge-response identification using single qubit unitary operators. Physica Scr. 95(10), 105104 (2020)
ADS
Article
Google Scholar
Zhang, S., et al.: A novel quantum identity authentication based on Bell states. Int. J. Theor. Phys. 59(1), 236–249 (2020)
MathSciNet
Article
Google Scholar
Makarov, V., Anisimov, A., Skaar, J.: Effects of detector efficiency mismatch on security of quantum cryptosystems. Phys. Rev. A 74(2), 022313 (2006)
ADS
Article
Google Scholar
Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 4(10), 686 (2010)
ADS
Article
Google Scholar
Gerhardt, I., Liu, Q., Lamas-Linares, A., Skaar, J., Kurtsiefer, C., Makarov, V.: Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2(1), 349 (2011)
ADS
Article
Google Scholar
Jain, N., Wittmann, C., Lydersen, L., Wiechers, C., Elser, D., Marquardt, C., Makarov, V., Leuchs, G.: Device calibration impacts security of quantum key distribution. Phys. Rev. Lett. 107(11), 110501 (2011)
ADS
Article
Google Scholar
Weier, H., Krauss, H., Rau, M., Fürst, M., Nauerth, S., Weinfurter, H.: Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors. New J. Phys. 13(7), 073024 (2011)
ADS
Article
Google Scholar
Wiechers, C., Lydersen, L., Wittmann, C., Elser, D., Skaar, J., Marquardt, C., Makarov, V., Leuchs, G.: After-gate attack on a quantum cryptosystem. New J. Phys. 13(1), 013043 (2011)
ADS
Article
Google Scholar
Bugge, A.N., Sauge, S., Ghazali, A.M.M., Skaar, J., Lydersen, L., Makarov, V.: Laser damage helps the eavesdropper in quantum cryptography. Phys. Rev. Lett. 112(7), 070503 (2014)
ADS
Article
Google Scholar
Makarov, V., Bourgoin, J.-P., Chaiwongkhot, P., Gagné, M., Jennewein, T., Kaiser, S., Kashyap, R., Legré, M., Minshull, C., Sajeed, S.: Creation of backdoors in quantum communications via laser damage. Phys. Rev. A 94(3), 030302 (2016)
ADS
Article
Google Scholar
Lee, M.-S., Woo, M.-K., Jung, J., Kim, Y.-S., Han, S.-W., Moon, S.: Free-space QKD system hacking by wavelength control using an external laser. Opt. Express 25(10), 11124–11131 (2017)
ADS
Article
Google Scholar
Lee, M.-S., Woo, M.-K., Kim, Y.-S., Cho, Y.-W., Han, S.-W., Moon, S.: Quantum hacking on a free-space quantum key distribution system without measuring quantum signals. JOSA B 36(3), B77–B82 (2019)
Article
Google Scholar
Lo, H.-K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108(13), 130503 (2012)
ADS
Article
Google Scholar
Puthoor, I.V., Amiri, R., Wallden, P., Curty, M., Andersson, E.: Measurement-device-independent quantum digital signatures. Phys. Rev. A 94(2), 022328 (2016)
ADS
MathSciNet
Article
Google Scholar
Tang, Y.-L., Yin, H.-L., Zhao, Q., Liu, H., Sun, X.-X., Huang, M.-Q., Zhang, W.-J., Chen, S.-J., Zhang, L., You, L.-X.: Measurement-device-independent quantum key distribution over untrustful metropolitan network. Phys. Rev. X 6(1), 011024 (2016)
Google Scholar
Choi, Y.-j, Kwon, O.-s, Woo, M.-K., Oh, K.-h, Han, S.-W., Kim, Y.-S., Moon, S.: Plug-and-play measurement-device-independent quantum key distribution. Phys. Rev. A 93(3), 032319 (2016)
ADS
Article
Google Scholar
Roberts, G., Lucamarini, M., Yuan, Z., Dynes, J., Comandar, L., Sharpe, A., Shields, A., Curty, M., Puthoor, I., Andersson, E.: Experimental measurement-device-independent quantum digital signatures. Nat. Commun. 8(1), 1–7 (2017)
Article
Google Scholar
Maitra, A.: Measurement device-independent quantum dialogue. Quantum Inf. Process. 16(12), 305 (2017)
ADS
MathSciNet
Article
Google Scholar
Park, Ch., Woo, M.K., Park, B.K., Lee, M.S., Kim, Y.-S., Cho, Y.-W., Kim, Y.-S., Han, S.-W., Moon, S.: Practical plug-and-play measurement-device-independent quantum key distribution with polarization division multiplexing. IEEE Access 6, 58587–58593 (2018)
Article
Google Scholar
Niu, P.-H., Zhou, Z.-R., Lin, Z.-S., Sheng, Y.-B., Yin, L.-G., Long, G.-L.: Measurement-device-independent quantum communication without encryption. Sci. Bull. 63(20), 1345–1350 (2018)
Article
Google Scholar
Liang, W., Xue, Q., Jiao, R.: The performance of three-intensity decoy-state measurement-device-independent quantum key distribution. Quantum Inf. Process. 19, 1–9 (2020)
MathSciNet
Article
Google Scholar
Lo, H.-K., Preskill, J.: Security of quantum key distribution using weak coherent states with nonrandom phases. Quantum Inf. Comput. 7(5 & 6), 431–458 (2007)
MathSciNet
MATH
Google Scholar
Divochiy, A., et al.: Superconducting nanowire photon-number-resolving detector at telecommunication wavelengths. Nat. Photonics 2(5), 302–306 (2008)
Article
Google Scholar
Kardynał, B.E., Yuan, Z.L., Shields, A.J.: An avalanche-photodiode-based photon-number-resolving detector. Nat. Photon. 2(7), 425–428 (2008)
Article
Google Scholar
Kok, P., Munro, W.J., Nemoto, K., Ralph, T.C., Dowling, J.P., Milburn, G.J.: Linear optical quantum computing with photonic qubits. Rev. Mod. Phys. 79(1), 135 (2007)
ADS
Article
Google Scholar
Kok, P.: Photonic quantum information processing. Contemp. Phys. 57(4), 526–544 (2016)
ADS
Article
Google Scholar