Securing practical quantum cryptosystems with optical power limiters Article Swipe
YOU?
·
· 2020
· Open Access
·
Controlling the energy of unauthorized light signals in a quantum cryptosystem is an essential task for implementation security. Here, we propose a passive optical power limiter device based on thermo-optical defocusing effects, which provides a reliable power limiting threshold that can be readily adjusted to suit various quantum applications. In addition, the device is robust against a wide variety of signal variations (e.g. wavelength, pulse width), which is important for implementation security. To show its practical utility for quantum cryptography, we demonstrate and discuss three potential applications: (1) measurement-device-independent quantum key distribution with enhanced security against a general class of Trojan-horse attacks, (2) using the power limiter as a countermeasure against bright illumination attacks, and (3) the application of power limiters to potentially enhance the implementation security of plug-and-play quantum key distribution.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://export.arxiv.org/pdf/2012.08702
- OA Status
- green
- Related Works
- 20
- OpenAlex ID
- https://openalex.org/W3111332110
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3111332110Canonical identifier for this work in OpenAlex
- Title
-
Securing practical quantum cryptosystems with optical power limitersWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2020Year of publication
- Publication date
-
2020-12-16Full publication date if available
- Authors
-
Gong Zhang, Ignatius William Primaatmaja, Jing Yan Haw, Xiao Gong, Chao Wang, Charles Ci Wen LimList of authors in order
- Landing page
-
https://export.arxiv.org/pdf/2012.08702Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://export.arxiv.org/pdf/2012.08702Direct OA link when available
- Concepts
-
Computer science, Quantum key distribution, Cryptosystem, Trojan horse, Limiter, Quantum cryptography, Quantum, Electronic engineering, Cryptography, Computer security, Physics, Quantum information, Telecommunications, Engineering, Quantum mechanicsTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- Related works (count)
-
20Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3111332110 |
|---|---|
| doi | |
| ids.mag | 3111332110 |
| ids.openalex | https://openalex.org/W3111332110 |
| fwci | |
| type | preprint |
| title | Securing practical quantum cryptosystems with optical power limiters |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10020 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9993000030517578 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Quantum Information and Cryptography |
| topics[1].id | https://openalex.org/T13182 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.994700014591217 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1703 |
| topics[1].subfield.display_name | Computational Theory and Mathematics |
| topics[1].display_name | Quantum-Dot Cellular Automata |
| topics[2].id | https://openalex.org/T10566 |
| topics[2].field.id | https://openalex.org/fields/31 |
| topics[2].field.display_name | Physics and Astronomy |
| topics[2].score | 0.9940999746322632 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/3107 |
| topics[2].subfield.display_name | Atomic and Molecular Physics, and Optics |
| topics[2].display_name | Laser-Matter Interactions and Applications |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.6992935538291931 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C95466800 |
| concepts[1].level | 3 |
| concepts[1].score | 0.6458830833435059 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q1027298 |
| concepts[1].display_name | Quantum key distribution |
| concepts[2].id | https://openalex.org/C6295992 |
| concepts[2].level | 3 |
| concepts[2].score | 0.5915430784225464 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q976521 |
| concepts[2].display_name | Cryptosystem |
| concepts[3].id | https://openalex.org/C2777337426 |
| concepts[3].level | 2 |
| concepts[3].score | 0.5878359079360962 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q14639 |
| concepts[3].display_name | Trojan horse |
| concepts[4].id | https://openalex.org/C45011657 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5204613208770752 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1613840 |
| concepts[4].display_name | Limiter |
| concepts[5].id | https://openalex.org/C144901912 |
| concepts[5].level | 4 |
| concepts[5].score | 0.4606137275695801 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q471906 |
| concepts[5].display_name | Quantum cryptography |
| concepts[6].id | https://openalex.org/C84114770 |
| concepts[6].level | 2 |
| concepts[6].score | 0.3798682689666748 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q46344 |
| concepts[6].display_name | Quantum |
| concepts[7].id | https://openalex.org/C24326235 |
| concepts[7].level | 1 |
| concepts[7].score | 0.3610340356826782 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q126095 |
| concepts[7].display_name | Electronic engineering |
| concepts[8].id | https://openalex.org/C178489894 |
| concepts[8].level | 2 |
| concepts[8].score | 0.34148985147476196 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q8789 |
| concepts[8].display_name | Cryptography |
| concepts[9].id | https://openalex.org/C38652104 |
| concepts[9].level | 1 |
| concepts[9].score | 0.31618058681488037 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[9].display_name | Computer security |
| concepts[10].id | https://openalex.org/C121332964 |
| concepts[10].level | 0 |
| concepts[10].score | 0.26686280965805054 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q413 |
| concepts[10].display_name | Physics |
| concepts[11].id | https://openalex.org/C169699857 |
| concepts[11].level | 3 |
| concepts[11].score | 0.2418161928653717 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q2122243 |
| concepts[11].display_name | Quantum information |
| concepts[12].id | https://openalex.org/C76155785 |
| concepts[12].level | 1 |
| concepts[12].score | 0.2139366865158081 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[12].display_name | Telecommunications |
| concepts[13].id | https://openalex.org/C127413603 |
| concepts[13].level | 0 |
| concepts[13].score | 0.15891733765602112 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q11023 |
| concepts[13].display_name | Engineering |
| concepts[14].id | https://openalex.org/C62520636 |
| concepts[14].level | 1 |
| concepts[14].score | 0.0680815577507019 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q944 |
| concepts[14].display_name | Quantum mechanics |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.6992935538291931 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/quantum-key-distribution |
| keywords[1].score | 0.6458830833435059 |
| keywords[1].display_name | Quantum key distribution |
| keywords[2].id | https://openalex.org/keywords/cryptosystem |
| keywords[2].score | 0.5915430784225464 |
| keywords[2].display_name | Cryptosystem |
| keywords[3].id | https://openalex.org/keywords/trojan-horse |
| keywords[3].score | 0.5878359079360962 |
| keywords[3].display_name | Trojan horse |
| keywords[4].id | https://openalex.org/keywords/limiter |
| keywords[4].score | 0.5204613208770752 |
| keywords[4].display_name | Limiter |
| keywords[5].id | https://openalex.org/keywords/quantum-cryptography |
| keywords[5].score | 0.4606137275695801 |
| keywords[5].display_name | Quantum cryptography |
| keywords[6].id | https://openalex.org/keywords/quantum |
| keywords[6].score | 0.3798682689666748 |
| keywords[6].display_name | Quantum |
| keywords[7].id | https://openalex.org/keywords/electronic-engineering |
| keywords[7].score | 0.3610340356826782 |
| keywords[7].display_name | Electronic engineering |
| keywords[8].id | https://openalex.org/keywords/cryptography |
| keywords[8].score | 0.34148985147476196 |
| keywords[8].display_name | Cryptography |
| keywords[9].id | https://openalex.org/keywords/computer-security |
| keywords[9].score | 0.31618058681488037 |
| keywords[9].display_name | Computer security |
| keywords[10].id | https://openalex.org/keywords/physics |
| keywords[10].score | 0.26686280965805054 |
| keywords[10].display_name | Physics |
| keywords[11].id | https://openalex.org/keywords/quantum-information |
| keywords[11].score | 0.2418161928653717 |
| keywords[11].display_name | Quantum information |
| keywords[12].id | https://openalex.org/keywords/telecommunications |
| keywords[12].score | 0.2139366865158081 |
| keywords[12].display_name | Telecommunications |
| keywords[13].id | https://openalex.org/keywords/engineering |
| keywords[13].score | 0.15891733765602112 |
| keywords[13].display_name | Engineering |
| keywords[14].id | https://openalex.org/keywords/quantum-mechanics |
| keywords[14].score | 0.0680815577507019 |
| keywords[14].display_name | Quantum mechanics |
| language | en |
| locations[0].id | mag:3111332110 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | submittedVersion |
| locations[0].raw_type | |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | arXiv (Cornell University) |
| locations[0].landing_page_url | http://export.arxiv.org/pdf/2012.08702 |
| authorships[0].author.id | https://openalex.org/A5084760142 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-7749-6177 |
| authorships[0].author.display_name | Gong Zhang |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Gong Zhang |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5022610036 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-7404-6752 |
| authorships[1].author.display_name | Ignatius William Primaatmaja |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Ignatius William Primaatmaja |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5030739747 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-8318-9245 |
| authorships[2].author.display_name | Jing Yan Haw |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Jing Yan Haw |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5014399843 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-9243-1937 |
| authorships[3].author.display_name | Xiao Gong |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Xiao Gong |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5100407078 |
| authorships[4].author.orcid | https://orcid.org/0000-0003-0057-5341 |
| authorships[4].author.display_name | Chao Wang |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Chao Wang |
| authorships[4].is_corresponding | False |
| authorships[5].author.id | https://openalex.org/A5101588650 |
| authorships[5].author.orcid | https://orcid.org/0000-0002-2332-4126 |
| authorships[5].author.display_name | Charles Ci Wen Lim |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Charles Ci Wen Lim |
| authorships[5].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | http://export.arxiv.org/pdf/2012.08702 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Securing practical quantum cryptosystems with optical power limiters |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-10-10T17:16:08.811792 |
| primary_topic.id | https://openalex.org/T10020 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9993000030517578 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Quantum Information and Cryptography |
| related_works | https://openalex.org/W3178808375, https://openalex.org/W1540014009, https://openalex.org/W3141038141, https://openalex.org/W2980484562, https://openalex.org/W1996679707, https://openalex.org/W2156303374, https://openalex.org/W3208284553, https://openalex.org/W1963576356, https://openalex.org/W2573059605, https://openalex.org/W1642241037, https://openalex.org/W3147783180, https://openalex.org/W2969908868, https://openalex.org/W1969211823, https://openalex.org/W223314118, https://openalex.org/W3183281577, https://openalex.org/W3110965967, https://openalex.org/W3105798408, https://openalex.org/W2938785797, https://openalex.org/W2966163321, https://openalex.org/W2934865451 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | mag:3111332110 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | arXiv (Cornell University) |
| best_oa_location.landing_page_url | http://export.arxiv.org/pdf/2012.08702 |
| primary_location.id | mag:3111332110 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | submittedVersion |
| primary_location.raw_type | |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | arXiv (Cornell University) |
| primary_location.landing_page_url | http://export.arxiv.org/pdf/2012.08702 |
| publication_date | 2020-12-16 |
| publication_year | 2020 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 8, 21, 34, 56, 96, 108 |
| abstract_inverted_index.In | 49 |
| abstract_inverted_index.To | 72 |
| abstract_inverted_index.an | 12 |
| abstract_inverted_index.as | 107 |
| abstract_inverted_index.be | 41 |
| abstract_inverted_index.in | 7 |
| abstract_inverted_index.is | 11, 53, 67 |
| abstract_inverted_index.of | 3, 59, 99, 118, 127 |
| abstract_inverted_index.on | 28 |
| abstract_inverted_index.to | 44, 121 |
| abstract_inverted_index.we | 19, 80 |
| abstract_inverted_index.(1) | 87 |
| abstract_inverted_index.(2) | 102 |
| abstract_inverted_index.(3) | 115 |
| abstract_inverted_index.and | 82, 114 |
| abstract_inverted_index.can | 40 |
| abstract_inverted_index.for | 15, 69, 77 |
| abstract_inverted_index.its | 74 |
| abstract_inverted_index.key | 90, 130 |
| abstract_inverted_index.the | 1, 51, 104, 116, 124 |
| abstract_inverted_index.show | 73 |
| abstract_inverted_index.suit | 45 |
| abstract_inverted_index.task | 14 |
| abstract_inverted_index.that | 39 |
| abstract_inverted_index.wide | 57 |
| abstract_inverted_index.with | 92 |
| abstract_inverted_index.(e.g. | 62 |
| abstract_inverted_index.Here, | 18 |
| abstract_inverted_index.based | 27 |
| abstract_inverted_index.class | 98 |
| abstract_inverted_index.light | 5 |
| abstract_inverted_index.power | 24, 36, 105, 119 |
| abstract_inverted_index.pulse | 64 |
| abstract_inverted_index.three | 84 |
| abstract_inverted_index.using | 103 |
| abstract_inverted_index.which | 32, 66 |
| abstract_inverted_index.bright | 111 |
| abstract_inverted_index.device | 26, 52 |
| abstract_inverted_index.energy | 2 |
| abstract_inverted_index.robust | 54 |
| abstract_inverted_index.signal | 60 |
| abstract_inverted_index.against | 55, 95, 110 |
| abstract_inverted_index.discuss | 83 |
| abstract_inverted_index.enhance | 123 |
| abstract_inverted_index.general | 97 |
| abstract_inverted_index.limiter | 25, 106 |
| abstract_inverted_index.optical | 23 |
| abstract_inverted_index.passive | 22 |
| abstract_inverted_index.propose | 20 |
| abstract_inverted_index.quantum | 9, 47, 78, 89, 129 |
| abstract_inverted_index.readily | 42 |
| abstract_inverted_index.signals | 6 |
| abstract_inverted_index.utility | 76 |
| abstract_inverted_index.variety | 58 |
| abstract_inverted_index.various | 46 |
| abstract_inverted_index.width), | 65 |
| abstract_inverted_index.adjusted | 43 |
| abstract_inverted_index.attacks, | 101, 113 |
| abstract_inverted_index.effects, | 31 |
| abstract_inverted_index.enhanced | 93 |
| abstract_inverted_index.limiters | 120 |
| abstract_inverted_index.limiting | 37 |
| abstract_inverted_index.provides | 33 |
| abstract_inverted_index.reliable | 35 |
| abstract_inverted_index.security | 94, 126 |
| abstract_inverted_index.addition, | 50 |
| abstract_inverted_index.essential | 13 |
| abstract_inverted_index.important | 68 |
| abstract_inverted_index.potential | 85 |
| abstract_inverted_index.practical | 75 |
| abstract_inverted_index.security. | 17, 71 |
| abstract_inverted_index.threshold | 38 |
| abstract_inverted_index.defocusing | 30 |
| abstract_inverted_index.variations | 61 |
| abstract_inverted_index.Controlling | 0 |
| abstract_inverted_index.application | 117 |
| abstract_inverted_index.demonstrate | 81 |
| abstract_inverted_index.potentially | 122 |
| abstract_inverted_index.wavelength, | 63 |
| abstract_inverted_index.Trojan-horse | 100 |
| abstract_inverted_index.cryptosystem | 10 |
| abstract_inverted_index.distribution | 91 |
| abstract_inverted_index.illumination | 112 |
| abstract_inverted_index.unauthorized | 4 |
| abstract_inverted_index.applications. | 48 |
| abstract_inverted_index.applications: | 86 |
| abstract_inverted_index.cryptography, | 79 |
| abstract_inverted_index.distribution. | 131 |
| abstract_inverted_index.plug-and-play | 128 |
| abstract_inverted_index.countermeasure | 109 |
| abstract_inverted_index.implementation | 16, 70, 125 |
| abstract_inverted_index.thermo-optical | 29 |
| abstract_inverted_index.measurement-device-independent | 88 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 6 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/7 |
| sustainable_development_goals[0].score | 0.7900000214576721 |
| sustainable_development_goals[0].display_name | Affordable and clean energy |
| citation_normalized_percentile |