{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T00:38:31Z","timestamp":1768264711531,"version":"3.49.0"},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100008431","name":"Consejer\u00eda de Educaci\u00f3n, Junta de Castilla y Le\u00f3n","doi-asserted-by":"publisher","award":["VA296P18"],"award-info":[{"award-number":["VA296P18"]}],"id":[{"id":"10.13039\/501100008431","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11128-021-03134-9","type":"journal-article","created":{"date-parts":[[2021,6,2]],"date-time":"2021-06-02T08:03:06Z","timestamp":1622620986000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Detector blinding attacks on counterfactual quantum key distribution"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7382-9405","authenticated-orcid":false,"given":"Carlos","family":"Navas-Merlo","sequence":"first","affiliation":[]},{"given":"Juan Carlos","family":"Garcia-Escartin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,2]]},"reference":[{"key":"3134_CR1","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"key":"3134_CR2","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Du\u0161ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301\u20131350 (2009)","journal-title":"Rev. Mod. Phys."},{"key":"3134_CR3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511617744","volume-title":"Quantum Cryptography and Secret-Key Distillation","author":"G van Assche","year":"2006","unstructured":"van Assche, G.: Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, Cambridge (2006)"},{"issue":"7","key":"3134_CR4","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1007\/BF00736012","volume":"23","author":"AC Elitzur","year":"1993","unstructured":"Elitzur, A.C., Vaidman, L.: Quantum mechanical interaction-free measurements. Found. Phys. 23(7), 987 (1993)","journal-title":"Found. Phys."},{"issue":"24","key":"3134_CR5","doi-asserted-by":"publisher","first-page":"4763","DOI":"10.1103\/PhysRevLett.74.4763","volume":"74","author":"P Kwiat","year":"1995","unstructured":"Kwiat, P., Weinfurter, H., Herzog, T., Zeilinger, A., Kasevich, M.A.: Interaction-free measurement. Phys. Rev. Lett. 74(24), 4763 (1995)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"3134_CR6","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.1364\/JOSAB.14.001275","volume":"14","author":"H Paul","year":"1997","unstructured":"Paul, H., Pavi\u010di\u0107, M.: Nonclassical interaction-free detection of objects in a monolithic total-internal-reflection resonator. J. Opt. Soc. Am. B 14(6), 1275\u20131279 (1997)","journal-title":"J. Opt. Soc. Am. B"},{"issue":"5","key":"3134_CR7","doi-asserted-by":"publisher","first-page":"3987","DOI":"10.1103\/PhysRevA.57.3987","volume":"57","author":"T Tsegaye","year":"1998","unstructured":"Tsegaye, T., Goobar, E., Karlsson, A., Bj\u00f6rk, G., Loh, M.Y., Lim, K.H.: Efficient interaction-free measurements in a high-finesse interferometer. Phys. Rev. A 57(5), 3987 (1998)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"3134_CR8","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S0375-9601(99)00235-2","volume":"256","author":"G-C Guo","year":"1999","unstructured":"Guo, G.-C., Shi, B.-S.: Quantum cryptography based on interaction-free measurement. Phys. Lett. A 256(2), 109\u2013112 (1999)","journal-title":"Phys. Lett. A"},{"key":"3134_CR9","doi-asserted-by":"publisher","first-page":"230501","DOI":"10.1103\/PhysRevLett.103.230501","volume":"103","author":"T-G Noh","year":"2009","unstructured":"Noh, T.-G.: Counterfactual quantum cryptography. Phys. Rev. Lett. 103, 230501 (2009)","journal-title":"Phys. Rev. Lett."},{"key":"3134_CR10","unstructured":"Bennett, C.\u00a0H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Proceedings of IEEE international Conference on Computers, Systems and Signal Processing, Bangalore, India, page 175, (1984)"},{"key":"3134_CR11","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"3134_CR12","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.92.057901","volume":"92","author":"V Scarani","year":"2004","unstructured":"Scarani, V., Ac\u00edn, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92, 057901 (2004)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"3134_CR13","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"issue":"23","key":"3134_CR14","doi-asserted-by":"publisher","first-page":"23590","DOI":"10.1364\/OE.19.023590","volume":"19","author":"S Sauge","year":"2011","unstructured":"Sauge, S., Lydersen, L., Anisimov, A., Skaar, J., Makarov, V.: Controlling an actively-quenched single photon detector with bright light. Opt. Express 19(23), 23590\u201323600 (2011)","journal-title":"Opt. Express"},{"key":"3134_CR15","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1038\/nphoton.2010.214","volume":"4","author":"L Lydersen","year":"2010","unstructured":"Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 4, 686\u2013689 (2010)","journal-title":"Nat. Photonics"},{"issue":"3","key":"3134_CR16","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1002\/lapl.201110120","volume":"9","author":"G Brida","year":"2012","unstructured":"Brida, G., Cavanna, A., Degiovanni, I.P., Genovese, M., Traina, P.: Experimental realization of counterfactual quantum cryptography. Laser Phys. Lett. 9(3), 247\u2013252 (2012)","journal-title":"Laser Phys. Lett."},{"key":"3134_CR17","doi-asserted-by":"publisher","first-page":"052318","DOI":"10.1103\/PhysRevA.82.052318","volume":"82","author":"Y Sun","year":"2010","unstructured":"Sun, Y., Wen, Q.-Y.: Counterfactual quantum key distribution with high efficiency. Phys. Rev. A 82, 052318 (2010)","journal-title":"Phys. Rev. A"},{"key":"3134_CR18","doi-asserted-by":"publisher","first-page":"042335","DOI":"10.1103\/PhysRevA.82.042335","volume":"82","author":"Z-Q Yin","year":"2010","unstructured":"Yin, Z.-Q., Li, H.-W., Chen, W., Han, Z.-F., Guo, G.-C.: Security of counterfactual quantum cryptography. Phys. Rev. A 82, 042335 (2010)","journal-title":"Phys. Rev. A"},{"key":"3134_CR19","unstructured":"Li, Y.-B., Wen, Q.-Y., Li, Z.-C.: Security flaw of counterfactual quantum cryptography in practical setting, arXiv:1312.1436v5, (2014)"},{"issue":"10","key":"3134_CR20","doi-asserted-by":"publisher","first-page":"2325","DOI":"10.1007\/s11128-014-0786-y","volume":"13","author":"Y-B Li","year":"2014","unstructured":"Li, Y.-B.: Analysis of counterfactual quantum key distribution using error-correcting theory. Quantum Inf. Process. 13(10), 2325\u20132342 (2014)","journal-title":"Quantum Inf. Process."},{"key":"3134_CR21","doi-asserted-by":"publisher","first-page":"022313","DOI":"10.1103\/PhysRevA.86.022313","volume":"86","author":"Z-Q Yin","year":"2012","unstructured":"Yin, Z.-Q., Li, H.-W., Yao, Y., Zhang, C.-M., Wang, S., Chen, W., Guo, G.-C., Han, Z.-F.: Counterfactual quantum cryptography based on weak coherent states. Phys. Rev. A 86, 022313 (2012)","journal-title":"Phys. Rev. A"},{"key":"3134_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.A.: Experimental quantum cryptography. J. Cryptol. 5, 3\u201328 (1992)","journal-title":"J. Cryptol."},{"key":"3134_CR23","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","volume":"85","author":"G Brassard","year":"2000","unstructured":"Brassard, G., L\u00fctkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330\u20131333 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"8","key":"3134_CR24","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1038\/nphoton.2014.149","volume":"8","author":"H-K Lo","year":"2014","unstructured":"Lo, H.-K., Curty, M., Tamaki, K.: Secure quantum key distribution. Nat. Photonics 8(8), 595\u2013604 (2014)","journal-title":"Nat. Photonics"},{"issue":"10","key":"3134_CR25","doi-asserted-by":"publisher","first-page":"103016","DOI":"10.1088\/1367-2630\/aade06","volume":"20","author":"A Huang","year":"2018","unstructured":"Huang, A., Barz, S., Andersson, E., Makarov, V.: Implementation vulnerabilities in general quantum cryptography. New J. Phys. 20(10), 103016 (2018)","journal-title":"New J. Phys."},{"key":"3134_CR26","doi-asserted-by":"publisher","first-page":"27938","DOI":"10.1364\/OE.18.027938","volume":"18","author":"L Lydersen","year":"2010","unstructured":"Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Thermal blinding of gated detectors in quantum cryptography. Opt. Express 18, 27938\u201327954 (2010)","journal-title":"Opt. Express"},{"issue":"8","key":"3134_CR27","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1080\/09500340.2011.565889","volume":"58","author":"L Lydersen","year":"2011","unstructured":"Lydersen, L., Skaar, J., Makarov, V.: Tailored bright illumination attack on distributed-phase-reference protocols. J. Mod. Opt. 58(8), 680\u2013685 (2011)","journal-title":"J. Mod. Opt."},{"key":"3134_CR28","doi-asserted-by":"publisher","first-page":"113042","DOI":"10.1088\/1367-2630\/13\/11\/113042","volume":"13","author":"L Lydersen","year":"2011","unstructured":"Lydersen, L., Akhlaghi, M.K., Majedi, A.H., Skaar, J., Makarov, V.: Controlling a superconducting nanowire single-photon detector using tailored bright illumination. New J. Phys. 13, 113042 (2011)","journal-title":"New J. Phys."},{"key":"3134_CR29","doi-asserted-by":"publisher","first-page":"013043","DOI":"10.1088\/1367-2630\/13\/1\/013043","volume":"13","author":"C Wiechers","year":"2011","unstructured":"Wiechers, C., Lydersen, L., Wittmann, C., Elser, D., Skaar, J., Marquardt, C., Makarov, V., Leuchs, G.: After-gate attack on a quantum cryptosystem. New J. Phys. 13, 013043 (2011)","journal-title":"New J. Phys."},{"issue":"1\u20132","key":"3134_CR30","first-page":"73","volume":"7","author":"B Qi","year":"2007","unstructured":"Qi, B., Fung, C.-H.F., Lo, H.-K., Ma, X.: Time-shift attack in practical quantum cryptosystems. Quantum Inf. Comput. 7(1\u20132), 73\u201382 (2007)","journal-title":"Quantum Inf. Comput."},{"issue":"4","key":"3134_CR31","doi-asserted-by":"publisher","first-page":"044003","DOI":"10.1088\/2058-9565\/aa804b","volume":"2","author":"P Chaiwongkhot","year":"2017","unstructured":"Chaiwongkhot, P., Sajeed, S., Lydersen, L., Makarov, V.: Finite-key-size effect in a commercial plug-and-play QKD system. Quantum Sci. Technol. 2(4), 044003 (2017)","journal-title":"Quantum Sci. Technol."},{"issue":"4","key":"3134_CR32","doi-asserted-by":"publisher","first-page":"042333","DOI":"10.1103\/PhysRevA.78.042333","volume":"78","author":"Y Zhao","year":"2008","unstructured":"Zhao, Y., Chi-HangFred, Fung, Qi, B., Chen, C., Lo, H.-K.: Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78(4), 042333 (2008)","journal-title":"Phys. Rev. A"},{"key":"3134_CR33","doi-asserted-by":"publisher","first-page":"032326","DOI":"10.1103\/PhysRevA.91.032326","volume":"91","author":"S Sajeed","year":"2015","unstructured":"Sajeed, S., Radchenko, I., Kaiser, S., Bourgoin, J.-P., Pappa, A., Monat, L., Legr\u00e9, M., Makarov, V.: Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing. Phys. Rev. A 91, 032326 (2015)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"3134_CR34","doi-asserted-by":"publisher","first-page":"032314","DOI":"10.1103\/PhysRevA.75.032314","volume":"75","author":"C-HF Fung","year":"2007","unstructured":"Fung, C.-H.F., Qi, B., Tamaki, K., Lo, H.-K.: Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A 75(3), 032314 (2007)","journal-title":"Phys. Rev. A"},{"key":"3134_CR35","doi-asserted-by":"publisher","first-page":"113026","DOI":"10.1088\/1367-2630\/12\/11\/113026","volume":"12","author":"F Xu","year":"2010","unstructured":"Xu, F., Qi, B., Lo, H.-K.: Experimental demonstration of phase-remapping attack in a practical quantum key distribution system. New J. Phys. 12, 113026 (2010)","journal-title":"New J. Phys."},{"key":"3134_CR36","doi-asserted-by":"publisher","first-page":"062301","DOI":"10.1103\/PhysRevA.91.062301","volume":"91","author":"S Sajeed","year":"2015","unstructured":"Sajeed, S., Chaiwongkhot, P., Bourgoin, J.-P., Jennewein, T., L\u00fctkenhaus, N., Makarov, V.: Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch. Phys. Rev. A 91, 062301 (2015)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"3134_CR37","doi-asserted-by":"publisher","first-page":"30012","DOI":"10.1209\/0295-5075\/98\/30012","volume":"98","author":"S Zhang","year":"2012","unstructured":"Zhang, S., Wnang, J., Tang, C.J.: Counterfactual attack on counterfactual quantum key distribution. EPL Europhys. Lett. 98(3), 30012 (2012)","journal-title":"EPL Europhys. Lett."},{"issue":"23","key":"3134_CR38","doi-asserted-by":"publisher","first-page":"4725","DOI":"10.1103\/PhysRevLett.83.4725","volume":"83","author":"P Kwiat","year":"1999","unstructured":"Kwiat, P., White, A.G., Mitchell, J.R., Nairz, O., Weihs, G., Weinfurter, H., Zeilinger, A.: High-efficiency quantum interrogation measurements via the quantum Zeno effect. Phys. Rev. Lett. 83(23), 4725 (1999)","journal-title":"Phys. Rev. Lett."},{"issue":"18","key":"3134_CR39","doi-asserted-by":"publisher","first-page":"1589","DOI":"10.1016\/j.physleta.2015.09.027","volume":"380","author":"X Yang","year":"2016","unstructured":"Yang, X., Wei, K., Ma, H., Sun, S., Du, Y., Wu, L.: Trojan horse attacks on counterfactual quantum key distribution. Phys. Lett. A 380(18), 1589\u20131592 (2016)","journal-title":"Phys. Lett. A"},{"key":"3134_CR40","doi-asserted-by":"publisher","first-page":"032320","DOI":"10.1103\/PhysRevA.84.032320","volume":"84","author":"L Lydersen","year":"2011","unstructured":"Lydersen, L., Jain, N., Wittmann, C., Mar\u00f8y, \u00d8., Skaar, J., Marquardt, C., Makarov, V., Leuchs, G.: Superlinear threshold detectors in quantum cryptography. Phys. Rev. A 84, 032320 (2011)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"3134_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/ncomms1348","volume":"2","author":"I Gerhardt","year":"2011","unstructured":"Gerhardt, I., Liu, Q., Lamas-Linares, A., Skaar, J., Kurtsiefer, C., Makarov, V.: Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2(1), 1\u20136 (2011)","journal-title":"Nat. Commun."},{"issue":"1","key":"3134_CR42","doi-asserted-by":"publisher","first-page":"013108","DOI":"10.1063\/1.4854615","volume":"85","author":"Q Liu","year":"2014","unstructured":"Liu, Q., Lamas-Linares, A., Kurtsiefer, C., Skaar, J., Makarov, V., Gerhardt, I.: A universal setup for active control of a single-photon detector. Rev. Sci. Instrum. 85(1), 013108 (2014)","journal-title":"Rev. Sci. Instrum."},{"key":"3134_CR43","doi-asserted-by":"publisher","first-page":"012312","DOI":"10.1103\/PhysRevA.98.012312","volume":"98","author":"H Qin","year":"2018","unstructured":"Qin, H., Kumar, R., Makarov, V., All\u00e9aume, R.: Homodyne-detector-blinding attack in continuous-variable quantum key distribution. Phys. Rev. A 98, 012312 (2018)","journal-title":"Phys. Rev. A"},{"issue":"22","key":"3134_CR44","doi-asserted-by":"publisher","first-page":"32253","DOI":"10.1364\/OE.27.032253","volume":"27","author":"V Chistiakov","year":"2019","unstructured":"Chistiakov, V., Huang, A., Egorov, V., Makarov, V.: Controlling single-photon detector id210 with bright light. Opt. Express 27(22), 32253\u201332262 (2019)","journal-title":"Opt. Express"},{"issue":"1","key":"3134_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-020-70045-7","volume":"10","author":"S Sajeed","year":"2020","unstructured":"Sajeed, S., Sultana, N., Lim, C.C.W., Makarov, V.: Bright-light detector control emulates the local bounds of Bell-type inequalities. Sci. Rep. 10(1), 1\u20138 (2020)","journal-title":"Sci. Rep."},{"issue":"7","key":"3134_CR46","doi-asserted-by":"publisher","first-page":"071101","DOI":"10.1063\/1.3610677","volume":"82","author":"MD Eisaman","year":"2011","unstructured":"Eisaman, M.D., Fan, J., Migdall, A., Polyakov, S.V.: Invited review article: single-photon sources and detectors. Rev. Sci. Instrum. 82(7), 071101 (2011)","journal-title":"Rev. Sci. Instrum."},{"issue":"4","key":"3134_CR47","doi-asserted-by":"publisher","first-page":"755","DOI":"10.1134\/S1054660X11070267","volume":"21","author":"Min Ren","year":"2011","unstructured":"Ren, Min, Wu, Guang, Wu, E., Zeng, Heping: Experimental demonstration of counterfactual quantum key distribution. Laser Phys. 21(4), 755\u2013760 (2011)","journal-title":"Laser Phys."},{"key":"3134_CR48","doi-asserted-by":"publisher","first-page":"030501","DOI":"10.1103\/PhysRevLett.109.030501","volume":"109","author":"Y Liu","year":"2012","unstructured":"Liu, Y., Ju, L., Liang, X.-L., Tang, S.-B., Tu, G.-L.S., Zhou, L., Peng, C.-Z., Chen, K., Chen, T.-Y., Chen, Z.-B., Pan, J.-W.: Experimental demonstration of counterfactual quantum communication. Phys. Rev. Lett. 109, 030501 (2012)","journal-title":"Phys. Rev. Lett."},{"key":"3134_CR49","doi-asserted-by":"crossref","unstructured":"Ten, S.: Ultra low-loss optical fiber technology. In 2016 Optical Fiber Communications Conference and Exhibition (OFC), pages 1\u20133. IEEE, (2016)","DOI":"10.1364\/OFC.2016.Th4E.5"},{"key":"3134_CR50","doi-asserted-by":"crossref","unstructured":"Tamura, Y., Sakuma, H., Morita, K., Suzuki, M., Yamamoto, Y., Shimada, K., Honma, Y., Sohma, K., Fujii, T., Hasegawa, T.: Lowest-ever 0.1419-dB\/km loss optical fiber. In 2017 Optical Fiber Communications Conference and Exhibition (OFC), pages 1\u20133, (2017)","DOI":"10.1364\/OFC.2017.Th5D.1"},{"key":"3134_CR51","doi-asserted-by":"crossref","unstructured":"Tamura, Y.: Ultra-low loss silica core fiber. In 2018 Optical Fiber Communications Conference and Exposition (OFC), pages 1\u20133, (2018)","DOI":"10.1364\/OFC.2018.M4B.1"},{"issue":"1","key":"3134_CR52","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/JLT.2018.2796647","volume":"36","author":"Y Tamura","year":"2018","unstructured":"Tamura, Y., Sakuma, H., Morita, K., Suzuki, M., Yamamoto, Y., Shimada, K., Honma, Y., Sohma, K., Fujii, T., Hasegawa, T.: The first 0.14-dB\/km loss optical fiber and its impact on submarine transmission. J. Lightwave Technol. 36(1), 44\u201349 (2018)","journal-title":"J. Lightwave Technol."},{"issue":"5","key":"3134_CR53","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1080\/09500340410001730986","volume":"52","author":"V Makarov","year":"2005","unstructured":"Makarov, V., Hjelme, D.R.: Faked states attack on quantum cryptosystems. J. Mod. Opt. 52(5), 691\u2013705 (2005)","journal-title":"J. Mod. Opt."},{"key":"3134_CR54","first-page":"5","volume":"IX","author":"A Kerckhoffs","year":"1883","unstructured":"Kerckhoffs, A.: La cryptographie militaire. J. des Sci. Mil. IX, 5\u201338 (1883)","journal-title":"J. des Sci. Mil."},{"key":"3134_CR55","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198501770.001.0001","volume-title":"The Quantum Theory of Light","author":"R Loudon","year":"2000","unstructured":"Loudon, R.: The Quantum Theory of Light. Oxford University Press, Oxford (2000)"},{"issue":"1","key":"3134_CR56","doi-asserted-by":"publisher","first-page":"2116","DOI":"10.1049\/el:19981473","volume":"34","author":"G Ribordy","year":"1998","unstructured":"Ribordy, G., Gautier, J.-D., Gisin, N., Guinnard, O., Zbinden, H.: Automated plug&play quantum key distribution. Electr. Lett. 34(1), 2116\u20132117 (1998)","journal-title":"Electr. Lett."},{"key":"3134_CR57","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.94.140501","volume":"94","author":"M Lucamarini","year":"2005","unstructured":"Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94, 140501 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"3134_CR58","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"3134_CR59","doi-asserted-by":"publisher","first-page":"062302","DOI":"10.1103\/PhysRevA.88.062302","volume":"88","author":"NJ Beaudry","year":"2013","unstructured":"Beaudry, N.J., Lucamarini, M., Mancini, S., Renner, R.: Security of two-way quantum key distribution. Phys. Rev. A 88, 062302 (2013)","journal-title":"Phys. Rev. A"},{"key":"3134_CR60","doi-asserted-by":"publisher","first-page":"032310","DOI":"10.1103\/PhysRevA.69.032310","volume":"69","author":"IP Degiovanni","year":"2004","unstructured":"Degiovanni, I.P., Ruo Berchera, I., Castelletto, S., Rastello, M.L., Bovino, F.A., Colla, A.M., Castagnoli, G.: Quantum dense key distribution. Phys. Rev. A 69, 032310 (2004)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"3134_CR61","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/srep04936","volume":"4","author":"Y-G Han","year":"2014","unstructured":"Han, Y.-G., Yin, Z.-Q., Li, H.-W., Chen, W., Wang, S., Guo, G.-C., Han, Z.-F.: Security of modified ping-pong protocol in noisy and lossy channel. Sci. Rep. 4(1), 1\u20134 (2014)","journal-title":"Sci. Rep."},{"issue":"12","key":"3134_CR62","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1038\/nphoton.2009.230","volume":"3","author":"RH Hadfield","year":"2009","unstructured":"Hadfield, R.H.: Single-photon detectors for optical quantum information applications. Nat. photonics 3(12), 696\u2013705 (2009)","journal-title":"Nat. photonics"},{"key":"3134_CR63","doi-asserted-by":"publisher","first-page":"022320","DOI":"10.1103\/PhysRevA.73.022320","volume":"73","author":"N Gisin","year":"2006","unstructured":"Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)","journal-title":"Phys. Rev. A"},{"issue":"12","key":"3134_CR64","doi-asserted-by":"publisher","first-page":"123030","DOI":"10.1088\/1367-2630\/16\/12\/123030","volume":"16","author":"N Jain","year":"2014","unstructured":"Jain, N., Anisimova, E., Khan, I., Makarov, V., Marquardt, C., Leuchs, G.: Trojan-horse attacks threaten the security of practical quantum cryptography. New J. Phys. 16(12), 123030 (2014)","journal-title":"New J. Phys."},{"issue":"3","key":"3134_CR65","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1109\/JSTQE.2014.2365585","volume":"21","author":"N Jain","year":"2015","unstructured":"Jain, N., Stiller, B., Khan, I., Makarov, V., Marquardt, C., Leuchs, G.: Risk analysis of trojan-horse attacks on practical quantum key distribution systems. IEEE J. Sel. Topics Quantum Electr 21(3), 168\u2013177 (2015)","journal-title":"IEEE J. Sel. Topics Quantum Electr"},{"issue":"1","key":"3134_CR66","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-016-0028-x","volume":"7","author":"S Sajeed","year":"2017","unstructured":"Sajeed, S., Minshull, C., Jain, N., Makarov, V.: Invisible trojan-horse attack. Sci. Rep. 7(1), 1\u20137 (2017)","journal-title":"Sci. Rep."},{"issue":"3","key":"3134_CR67","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1109\/JSTQE.2015.2389528","volume":"21","author":"CCW Lim","year":"2015","unstructured":"Lim, C.C.W., Walenta, N., Legr\u00e9, M., Gisin, N., Zbinden, H.: Random variation of detector efficiency: a countermeasure against detector blinding attacks for quantum key distribution. IEEE J. Sel. Topics Quantum Elect. 21(3), 192\u2013196 (2015)","journal-title":"IEEE J. Sel. Topics Quantum Elect."},{"key":"3134_CR68","doi-asserted-by":"publisher","first-page":"062321","DOI":"10.1103\/PhysRevA.94.062321","volume":"94","author":"MS Lee","year":"2016","unstructured":"Lee, M.S., Park, B.K., Woo, M.K., Park, C.H., Kim, Y.-S., Han, S.-W., Moon, S.: Countermeasure against blinding attacks on low-noise detectors with a background-noise-cancellation scheme. Phys. Rev. A 94, 062321 (2016)","journal-title":"Phys. Rev. A"},{"key":"3134_CR69","doi-asserted-by":"publisher","first-page":"044027","DOI":"10.1103\/PhysRevApplied.9.044027","volume":"9","author":"A Koehler-Sidki","year":"2018","unstructured":"Koehler-Sidki, A., Dynes, J.F., Lucamarini, M., Roberts, G.L., Sharpe, A.W., Yuan, Z.L., Shields, A.J.: Best-practice criteria for practical security of self-differencing avalanche photodiode detectors in quantum key distribution. Phys. Rev. Appl. 9, 044027 (2018)","journal-title":"Phys. Rev. Appl."},{"key":"3134_CR70","doi-asserted-by":"publisher","first-page":"022327","DOI":"10.1103\/PhysRevA.98.022327","volume":"98","author":"A Koehler-Sidki","year":"2018","unstructured":"Koehler-Sidki, A., Lucamarini, M., Dynes, J.F., Roberts, G.L., Sharpe, A.W., Yuan, Z., Shields, A.J.: Intensity modulation as a preemptive measure against blinding of single-photon detectors based on self-differencing cancellation. Phys. Rev. A 98, 022327 (2018)","journal-title":"Phys. Rev. A"},{"issue":"11","key":"3134_CR71","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JQE.2016.2611443","volume":"52","author":"A Huang","year":"2016","unstructured":"Huang, A., Sajeed, S., Chaiwongkhot, P., Soucarros, M., Legr\u00e9, M., Makarov, V.: Testing random-detector-efficiency countermeasure in a commercial system reveals a breakable unrealistic assumption. IEEE J. Quantum Electr. 52(11), 1\u201311 (2016)","journal-title":"IEEE J. Quantum Electr."},{"issue":"12","key":"3134_CR72","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1038\/nphoton.2010.278","volume":"4","author":"L Lydersen","year":"2010","unstructured":"Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Avoiding the blinding attack in QKD. Nat. Photonics 4(12), 801\u2013801 (2010)","journal-title":"Nat. Photonics"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03134-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03134-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03134-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T01:13:51Z","timestamp":1725153231000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03134-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":72,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["3134"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03134-9","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6]]},"assertion":[{"value":"5 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 May 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"196"}}