The Trojan-horse attacks on quantum key distribution (QKD) systems are known to be a threat to secure key sharing between two parties (Alice and Bob). To protect a QKD system against such attacks a variety of passive optical and active optical devices embedded in Alice’s and Bob’s setup are widely used. However, a security analysis against the Trojan-horse attack is required to ensure the unconditional security of a QKD system. We present a security analysis against the Trojan-horse attacks on a practical fiber-based QKD phase-coding system in 400–1700 nm spectral range. The obtained results made it possible to calculate the higher limit of average photon number returned to Eve and the probabilities of Eve’s success of the attack on a particular QKD system.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.