pith. sign in

arxiv: 2508.15136 · v2 · submitted 2025-08-21 · 🪐 quant-ph · physics.optics

Wide-spectrum security of quantum key distribution

Pith reviewed 2026-05-18 22:42 UTC · model grok-4.3

classification 🪐 quant-ph physics.optics
keywords quantum key distributionoptical securitytransmittance characterizationTrojan-horse attackinsertion lossspectral analysisfiber-optic componentsQKD certification
0
0 comments X

The pith

QKD systems achieve full optical spectrum safety by characterizing transmittance from 400 to 2300 nm with high sensitivity.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper proposes a wide-spectrum security evaluation methodology to protect quantum key distribution implementations from optical attacks that use arbitrary wavelengths. Most such attacks rely on injecting or detecting light through transparency windows in fiber-optic components, so the method requires measuring insertion loss over a broad band with high dynamic range. A practical testbench is presented that covers 400 to 2300 nm and reaches 70 dB sensitivity. The authors apply the approach to perform complete Trojan-horse attack analysis on typical QKD configurations and briefly consider induced-photorefraction and detector-backflash attacks. The resulting data support certification of QKD systems for comprehensive optical safety.

Core claim

We propose a wide-spectrum security evaluation methodology to achieve full optical spectrum safety for QKD systems. This technique requires transmittance characterisation in a wide spectral band with a high sensitivity. We report a testbench that characterises insertion loss of fiber-optic components in a wide spectral range of 400 to 2300 nm and up to 70 dB dynamic range. To illustrate practical application, we give a full Trojan-horse attack analysis for some typical QKD system configurations and discuss briefly induced-photorefraction and detector-backflash attacks.

What carries the argument

Wide-spectrum transmittance characterisation testbench measuring insertion loss from 400 to 2300 nm with up to 70 dB dynamic range, used to identify exploitable transparency windows.

If this is right

  • Typical QKD configurations receive full Trojan-horse attack analysis once wide-spectrum insertion loss data are available.
  • QKD systems can be certified against optical attacks that exploit any transparency window in the measured band.
  • Induced-photorefraction and detector-backflash attacks can be evaluated using the same transmittance dataset.
  • Eavesdroppers are prevented from gaining advantage by choosing attack wavelengths within the characterized spectrum.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • Deployed QKD networks might require periodic re-testing of components if environmental factors alter transmittance over time.
  • Manufacturers could incorporate this testbench into quality control to reduce hidden spectral vulnerabilities before installation.
  • The same wide-spectrum approach could extend to other quantum optics protocols that use fiber channels.

Load-bearing premise

Laboratory insertion loss measurements from 400 to 2300 nm are sufficient to capture all relevant attack wavelengths and accurately predict component behavior in deployed QKD systems.

What would settle it

Successful eavesdropping on a characterized QKD system at a wavelength where the testbench reported high insertion loss, or using a wavelength outside the 400-2300 nm band, would show the methodology fails to ensure safety.

Figures

Figures reproduced from arXiv: 2508.15136 by Feihu Xu, Hao Tan, Jian-Wei Pan, Liying Han, Mikhail Petrov, Sheng-Kai Liao, Vadim Makarov, Weiyang Zhang.

Figure 1
Figure 1. Figure 1: FIG. 1. General structure of a cryptographic module from [PITH_FULL_IMAGE:figures/full_fig_p003_1.png] view at source ↗
Figure 2
Figure 2. Figure 2: FIG. 2. Scheme of the spectral characterisation testbench. [PITH_FULL_IMAGE:figures/full_fig_p004_2.png] view at source ↗
Figure 3
Figure 3. Figure 3: FIG. 3. Spectral performance of the testbench. (a) Spectrum of the light source (measured with the DUT replaced with a [PITH_FULL_IMAGE:figures/full_fig_p005_3.png] view at source ↗
Figure 4
Figure 4. Figure 4: FIG. 4. Transmittance of a 2-m long single-mode fiber patch [PITH_FULL_IMAGE:figures/full_fig_p005_4.png] view at source ↗
Figure 5
Figure 5. Figure 5: FIG. 5. Source configurations. The fiber coil is used as [PITH_FULL_IMAGE:figures/full_fig_p006_5.png] view at source ↗
Figure 6
Figure 6. Figure 6: FIG. 6. Spectral characteristics of the isolator. The spec [PITH_FULL_IMAGE:figures/full_fig_p006_6.png] view at source ↗
Figure 8
Figure 8. Figure 8: FIG. 8. Spectral characteristics of MEMS VOA at different [PITH_FULL_IMAGE:figures/full_fig_p007_8.png] view at source ↗
Figure 9
Figure 9. Figure 9: FIG. 9. Spectral characteristics of DWDM. The scan is at [PITH_FULL_IMAGE:figures/full_fig_p007_9.png] view at source ↗
Figure 10
Figure 10. Figure 10: FIG. 10. Spectral characteristics of the FBG-based filter. The [PITH_FULL_IMAGE:figures/full_fig_p008_10.png] view at source ↗
Figure 11
Figure 11. Figure 11: FIG. 11. Security analysis of BB84 QKD under the THA. (a) Secure key rate for different attenuations of Trojan photons. [PITH_FULL_IMAGE:figures/full_fig_p009_11.png] view at source ↗
Figure 12
Figure 12. Figure 12: FIG. 12. Security analysis of MDI QKD under the THA. (a) Secure key rate for different attenuations of Trojan photons. [PITH_FULL_IMAGE:figures/full_fig_p010_12.png] view at source ↗
Figure 13
Figure 13. Figure 13: FIG. 13. Total measured attenuation of Eve’s light reaching [PITH_FULL_IMAGE:figures/full_fig_p010_13.png] view at source ↗
read the original abstract

Implementations of quantum key distribution (QKD) need vulnerability assessment against loopholes in their optical scheme. Most of the optical attacks involve injecting or receiving extraneous light via the communication channel. An eavesdropper can choose her attack wavelengths arbitrarily within the quantum channel passband to maximise the attack performance, exploiting spectral transparency windows of system components. Here we propose a wide-spectrum security evaluation methodology to achieve full optical spectrum safety for QKD systems. This technique requires transmittance characterisation in a wide spectral band with a high sensitivity. We report a testbench that characterises insertion loss of fiber-optic components in a wide spectral range of 400 to 2300 nm and up to 70 dB dynamic range. To illustrate practical application of the proposed methodology, we give a full Trojan-horse attack analysis for some typical QKD system configurations and discuss briefly induced-photorefraction and detector-backflash attacks. Our methodology can be used for certification of QKD systems.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 2 minor

Summary. The manuscript proposes a wide-spectrum security evaluation methodology for QKD systems to achieve full optical spectrum safety. It requires transmittance characterization over 400–2300 nm with high sensitivity and reports a testbench achieving up to 70 dB dynamic range for insertion-loss measurements of fiber-optic components. The approach is illustrated via Trojan-horse attack analysis for typical QKD configurations, with brief discussion of induced-photorefraction and detector-backflash attacks; the methodology is positioned for use in QKD certification.

Significance. If the laboratory measurements prove representative of deployed systems, the work provides a concrete, standards-grounded procedure for identifying spectral vulnerabilities that narrow-band checks could miss, strengthening practical security assessment and certification of QKD implementations.

major comments (2)
  1. [Testbench section] Testbench description (likely §3): the 70 dB dynamic range claim is presented without accompanying calibration procedures, uncertainty budgets, or raw data, which are required to substantiate the high-sensitivity characterization that underpins the wide-spectrum safety methodology.
  2. [Discussion of deployed systems] Methodology application and discussion (likely §4–5): the central claim that the characterization delivers full optical-spectrum safety for QKD systems rests on the unexamined assumption that lab-measured loss spectra remain valid under deployed conditions; no data or analysis addresses shifts due to temperature drift, mechanical stress, or aging that could open new transparency windows below the 70 dB floor.
minor comments (2)
  1. [Abstract] The abstract would benefit from explicitly naming the specific QKD configurations used in the Trojan-horse analysis.
  2. [Methods] Notation for insertion loss and dynamic range should be defined consistently when first introduced.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the constructive and detailed review of our manuscript. We address each major comment below, indicating where revisions will be made to improve clarity and substantiation.

read point-by-point responses
  1. Referee: [Testbench section] Testbench description (likely §3): the 70 dB dynamic range claim is presented without accompanying calibration procedures, uncertainty budgets, or raw data, which are required to substantiate the high-sensitivity characterization that underpins the wide-spectrum safety methodology.

    Authors: We agree that the manuscript would benefit from additional details to support the reported dynamic range. In the revised version, we will expand the testbench description in §3 to include the calibration procedures employed, an uncertainty budget for the insertion-loss measurements across the 400–2300 nm range, and representative raw data or example spectra demonstrating the achieved sensitivity. These additions will directly substantiate the high-sensitivity characterization central to the proposed methodology. revision: yes

  2. Referee: [Discussion of deployed systems] Methodology application and discussion (likely §4–5): the central claim that the characterization delivers full optical-spectrum safety for QKD systems rests on the unexamined assumption that lab-measured loss spectra remain valid under deployed conditions; no data or analysis addresses shifts due to temperature drift, mechanical stress, or aging that could open new transparency windows below the 70 dB floor.

    Authors: The referee correctly notes that our discussion does not examine how lab-measured spectra might change under deployed conditions. The manuscript presents a laboratory methodology for identifying spectral vulnerabilities to support security evaluation and certification. We will revise §§4–5 to explicitly clarify that the reported characterizations provide a baseline assessment under controlled conditions, and that full optical-spectrum safety in the field would require additional verification accounting for environmental factors such as temperature drift, mechanical stress, and aging. We will also note that such extended testing is recommended for certification but lies beyond the scope of the current work, which focuses on establishing the wide-spectrum evaluation approach itself. revision: partial

Circularity Check

0 steps flagged

No significant circularity; experimental methodology is self-contained

full rationale

The manuscript proposes and demonstrates an experimental testbench for wide-spectrum insertion-loss characterization of QKD components (400–2300 nm, up to 70 dB dynamic range) and illustrates its use on Trojan-horse, induced-photorefraction, and detector-backflash attacks. No equations, fitted parameters, or predictions are defined in terms of themselves; the central claim is a practical measurement procedure grounded in standard optical metrology rather than a derivation that reduces to its inputs by construction. No self-citations serve as load-bearing uniqueness theorems, and no ansatzes or renamings of known results are smuggled in. The work therefore remains self-contained against external benchmarks with no circular steps.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

The paper rests on standard domain assumptions from quantum optics and fiber component characterization without introducing new free parameters or postulated entities.

axioms (1)
  • domain assumption Eavesdroppers can select attack wavelengths arbitrarily within the quantum channel passband to exploit spectral transparency windows of system components.
    Invoked to justify the need for wide-spectrum rather than narrow-band testing.

pith-pipeline@v0.9.0 · 5710 in / 1289 out tokens · 43069 ms · 2026-05-18T22:42:27.627911+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

What do these tags mean?
matches
The paper's claim is directly supported by a theorem in the formal canon.
supports
The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
extends
The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
uses
The paper appears to rely on the theorem as machinery.
contradicts
The paper's claim conflicts with a theorem or certificate in the canon.
unclear
Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Reference-Beam Attacks against Twin-Field Quantum Key Distribution using Optical Injection Locking

    quant-ph 2025-08 conditional novelty 6.0

    Experimental demonstration that reference-beam manipulation in OIL-based TF-QKD enables deterministic photon-number increase or decoy-state circumvention, with practical countermeasures proposed.

Reference graph

Works this paper leans on

68 extracted references · 68 canonical work pages · cited by 1 Pith paper

  1. [1]

    We test a polarisation-insensitive isolator (Optizone Technology PII-55-P-T-2-11-LL-1)

    Characterisation of individual components Isolator. We test a polarisation-insensitive isolator (Optizone Technology PII-55-P-T-2-11-LL-1). Its trans- Laser Modulator(s) VOAs Isolators Fiber coil DWDM ComPass Ref Circulator FBG (a) (b) (c) in out       1 2 3 FIG. 5. Source configurations. The fiber coil is used as the broadband physical filter. T...

  2. [2]

    Planes Complementarios de I+D+I con las Comunidades Au- tonomas

    Security evaluation The impact of information leakage from the encod- ing module caused by the THA needs to be quantified. Since the target susceptibility S to THA is assumed to be wavelength-independent and need not be tested, the above measurements are sufficient for protocol security analysis [28]. The targets of the THA are the phase and intensity mod...

  3. [3]

    C. H. Bennett and G. Brassard, Quantum cryptography: public key distribution and coin tossing, in Proc. Inter- national Conference on Computers, Systems, and Sig- nal Processing (IEEE Press, New York, Bangalore, India,

  4. [4]

    A. K. Ekert, Quantum Cryptography Based on Bell’s Theorem, Phys. Rev. Lett. 67, 661 (1991)

  5. [5]

    F. Xu, X. Ma, Q. Zhang, H.-K. Lo, and J.-W. Pan, Se- cure quantum key distribution with realistic devices, Rev. Mod. Phys. 92, 025002 (2020). 12

  6. [6]

    Diamanti, H.-K

    E. Diamanti, H.-K. Lo, B. Qi, and Z. Yuan, Practical challenges in quantum key distribution, npj Quantum Inf. 2, 16025 (2016)

  7. [7]

    Vakhitov, V

    A. Vakhitov, V. Makarov, and D. R. Hjelme, Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography, J. Mod. Opt. 48, 2023 (2001)

  8. [8]

    Gisin, S

    N. Gisin, S. Fasel, B. Kraus, H. Zbinden, and G. Ri- bordy, Trojan-horse attacks on quantum-key-distribution systems, Phys. Rev. A 73, 022320 (2006)

  9. [9]

    Makarov, A

    V. Makarov, A. Anisimov, and J. Skaar, Effects of de- tector efficiency mismatch on security of quantum cryp- tosystems, Phys. Rev. A74, 022313 (2006), erratum ibid. 78, 019905 (2008)

  10. [10]

    Makarov, Controlling passively quenched single pho- ton detectors by bright light, New J

    V. Makarov, Controlling passively quenched single pho- ton detectors by bright light, New J. Phys. 11, 065003 (2009)

  11. [11]

    F. Xu, B. Qi, and H.-K. Lo, Experimental demonstration of phase-remapping attack in a practical quantum key distribution system, New J. Phys. 12, 113026 (2010)

  12. [12]

    Lydersen, C

    L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, Hacking commercial quan- tum cryptography systems by tailored bright illumina- tion, Nat. Photonics 4, 686 (2010)

  13. [13]

    H.-W. Li, S. Wang, J.-Z. Huang, W. Chen, Z.-Q. Yin, F.-Y. Li, Z. Zhou, D. Liu, Y. Zhang, G.-C. Guo, W.-S. Bao, and Z.-F. Han, Attacking a practical quantum-key- distribution system with wavelength-dependent beam- splitter and multiwavelength sources, Phys. Rev. A 84, 062308 (2011)

  14. [14]

    N. Jain, E. Anisimova, I. Khan, V. Makarov, C. Mar- quardt, and G. Leuchs, Trojan-horse attacks threaten the security of practical quantum cryptography, New J. Phys. 16, 123030 (2014)

  15. [15]

    Sajeed, I

    S. Sajeed, I. Radchenko, S. Kaiser, J.-P. Bourgoin, A. Pappa, L. Monat, M. Legr´ e, and V. Makarov, Attacks exploiting deviation of mean photon number in quan- tum key distribution and coin tossing, Phys. Rev. A 91, 032326 (2015)

  16. [16]

    A. N. Bugge, S. Sauge, A. M. M. Ghazali, J. Skaar, L. Ly- dersen, and V. Makarov, Laser damage helps the eaves- dropper in quantum cryptography, Phys. Rev. Lett.112, 070503 (2014)

  17. [17]

    S.-H. Sun, F. Xu, M.-S. Jiang, X.-C. Ma, H.-K. Lo, and L.-M. Liang, Effect of source tampering in the security of quantum cryptography, Phys. Rev. A 92, 022304 (2015)

  18. [18]

    Y. Shi, J. Z. J. Lim, H. S. Poh, P. K. Tan, P. A. Tan, A. Ling, and C. Kurtsiefer, Breakdown flash at telecom wavelengths in InGaAs avalanche photodiodes, Opt. Ex- press 25, 30388 (2017)

  19. [19]

    P. V. P. Pinheiro, P. Chaiwongkhot, S. Sajeed, R. T. Horn, J.-P. Bourgoin, T. Jennewein, N. L¨ utkenhaus, and V. Makarov, Eavesdropping and countermeasures for backflash side channel in quantum cryptography, Opt. Express 26, 21020 (2018)

  20. [20]

    Huang, ´A

    A. Huang, ´A. Navarrete, S.-H. Sun, P. Chaiwongkhot, M. Curty, and V. Makarov, Laser-seeding attack in quantum key distribution, Phys. Rev. Appl. 12, 064043 (2019)

  21. [21]

    K. Wei, W. Zhang, Y.-L. Tang, L. You, and F. Xu, Im- plementation security of quantum key distribution due to polarization-dependent efficiency mismatch, Phys. Rev. A 100, 022325 (2019)

  22. [22]

    Huang, R

    A. Huang, R. Li, V. Egorov, S. Tchouragoulov, K. Ku- mar, and V. Makarov, Laser-damage attack against opti- cal attenuators in quantum key distribution, Phys. Rev. Appl. 13, 034017 (2020)

  23. [23]

    H. Tan, W. Li, L. Zhang, K. Wei, and F. Xu, Chip-based quantum key distribution against Trojan-horse attack, Phys. Rev. Appl. 15, 064038 (2021)

  24. [24]

    Ponosova, D

    A. Ponosova, D. Ruzhitskaya, P. Chaiwongkhot, V. Egorov, V. Makarov, and A. Huang, Protecting fiber- optic quantum key distribution sources against light- injection attacks, PRX Quantum 3, 040307 (2022)

  25. [25]

    P. Ye, W. Chen, G.-W. Zhang, F.-Y. Lu, F.-X. Wang, G.-Z. Huang, S. Wang, D.-Y. He, Z.-Q. Yin, G.-C. Guo, and Z.-F. Han, Induced-photorefraction attack against quantum key distribution, Phys. Rev. Appl. 19, 054052 (2023)

  26. [26]

    L. Han, Y. Li, H. Tan, W. Zhang, W. Cai, J. Yin, J. Ren, F. Xu, S. Liao, and C. Peng, Effect of light injection on the security of practical quantum key distribution, Phys. Rev. Appl. 20, 044013 (2023)

  27. [27]

    Fadeev, A

    M. Fadeev, A. Ponosova, Q. Peng, A. Huang, R. Shakhovoy, and V. Makarov, Optical-pumping at- tack on a quantum key distribution laser source, arXiv:2503.11239 [quant-ph]

  28. [28]

    Sajeed, C

    S. Sajeed, C. Minshull, N. Jain, and V. Makarov, Invisible Trojan-horse attack, Sci. Rep. 7, 8403 (2017)

  29. [29]

    A. Meda, I. P. Degiovanni, A. Tosi, Z. Yuan, G. Brida, and M. Genovese, Quantifying backflash radiation to prevent zero-error attacks in quantum key distribution, Light Sci. Appl. 6, e16261 (2017)

  30. [30]

    Lucamarini, I

    M. Lucamarini, I. Choi, M. B. Ward, J. F. Dynes, Z. L. Yuan, and A. J. Shields, Practical security bounds against the Trojan-horse attack in quantum key distri- bution, Phys. Rev. X 5, 031030 (2015)

  31. [31]

    N. Jain, B. Stiller, I. Khan, V. Makarov, C. Marquardt, and G. Leuch, Risk analysis of Trojan-horse attacks on practical quantum key distribution systems, IEEE J. Sel. Top. Quantum Electron. 21, 6600710 (2015)

  32. [32]

    ISO/IEC 23837-2:2023(en). Information security — Se- curity requirements, test and evaluation methods for quantum key distribution — Part 2: Evaluation and test- ing methods, https://www.iso.org/obp/ui/en/#iso: std:iso- iec:23837:-2:ed-1:v1:en , visited 22 Nov 2023

  33. [33]

    Makarov, A

    V. Makarov, A. Abrikosov, P. Chaiwongkhot, A. K. Fe- dorov, A. Huang, E. Kiktenko, M. Petrov, A. Ponosova, D. Ruzhitskaya, A. Tayduganov, D. Trefilov, and K. Za- itsev, Preparing a commercial quantum key distribu- tion system for certification against implementation loop- holes, Phys. Rev. Appl. 22, 044076 (2024)

  34. [34]

    Tomita, Implementation cecurity certification of decoy-BB84 quantum key distribution systems, Adv

    A. Tomita, Implementation cecurity certification of decoy-BB84 quantum key distribution systems, Adv. Quantum Technol. 2, 1900005 (2019)

  35. [35]

    Sajeed, P

    S. Sajeed, P. Chaiwongkhot, A. Huang, H. Qin, V. Egorov, A. Kozubov, A. Gaidash, V. Chistiakov, A. Vasiliev, A. Gleim, and V. Makarov, An approach for security evaluation and certification of a complete quan- tum communication system, Sci. Rep. 11, 5110 (2021)

  36. [36]

    Draft ETSI GS QKD 010 V0.4.1 (2021-06). Quantum key distribution (QKD); Implementation security: protection against Trojan horse attacks, https://docbox.etsi.or g/ISG/QKD/Open/GS-QKD-0010_ISTrojan_v0.4.1_Open Area.pdf, visited 16 Mar 2025

  37. [37]

    Zhang, Y

    Y. Zhang, Y. Bian, Z. Li, S. Yu, and H. Guo, Continuous- variable quantum key distribution system: past, present, 13 and future, Appl. Phys. Rev. 11, 011318 (2024)

  38. [38]

    Marquardt, U

    C. Marquardt, U. Seyfarth, S. Bettendorf, M. Bohmann, A. Buchner, M. Curty, D. Elser, S. Eul, T. Gehring, N. Jain, T. Klocke, M. Reinecke, N. Sieber, R. Ursin, M. Wehling, and H. Weier, Implementation attacks against QKD systems, BSI technical report, https: //www.bsi.bund.de/EN/Service- Navi/Publikatio nen/Studien/QKD-Systems/Implementation_Attacks_ QKD_...

  39. [39]

    NKT Photonics, SuperK Fianium supercontinuum white light fiber lasers, https://www.nktphotonics.com/pro ducts/supercontinuum-white-light-lasers/superk -fianium/, visited 27 Nov 2023

  40. [40]

    Nasedkin, F

    B. Nasedkin, F. Kiselev, I. Filipov, D. Tolochko, A. Ismagilov, V. Chistiakov, A. Gaidash, A. Tcyp- kin, A. Kozubov, and V. Egorov, Loopholes in the 1500–2100-nm range for quantum-key-distribution com- ponents: prospects for Trojan-horse attacks, Phys. Rev. Appl. 20, 014038 (2023)

  41. [41]

    NKT Photonics, SuperK Split spectral splitter, https: //www.nktphotonics.com/products/supercontinuum -white-light-lasers/superk-split/ , visited 27 Nov 2023

  42. [42]

    NKT Photonics, SuperK Connect broadband fiber deliv- ery, https://www.nktphotonics.com/products/supe rcontinuum-white-light-lasers/superk-connect/ , visited 27 Nov 2023

  43. [43]

    Yokogawa, AQ6374 wide range optical spectrum ana- lyzer, https://tmi.yokogawa.com/solutions/disco ntinued/aq6374-wide-range-optical-spectrum-ana lyzer-350-1750-nm/ , visited 27 Nov 2023

  44. [44]

    Yokogawa, AQ6375B wide range optical spectrum ana- lyzer, https://tmi.yokogawa.com/solutions/discont inued/aq6375b-optical-spectrum-analyzer/ , visited 27 Nov 2023

  45. [45]

    Q. Wang, G. Farrell, and T. Freir, Theoretical and exper- imental investigations of macro-bend losses for standard single mode fibers, Opt. Express 13, 4476 (2005)

  46. [46]

    W. Chen, Z. Chen, Y. Zhang, H. Li, and Y. Lian, Agarose coated macro-bend fiber sensor for relative humidity and temperature measurement at 2 µm, Opt. Fiber Technol. 50, 118 (2019)

  47. [47]

    M. A. Green and M. J. Keevers, Optical properties of intinsic silicon at 300 K, Prog. Photovolt. Res. Appl. 3, 189 (1995)

  48. [48]

    M. A. Green, Self-consistent optical parameters of intrin- sic silicon at 300 K including temperature coefficients, Sol. Energy Mater. Sol. Cells 92, 1305 (2008)

  49. [49]

    Kasap and P

    S. Kasap and P. Kapper, eds., Springer handbook of elec- tronic and photonic materials (Springer, St¨ urtz GmbH, W¨ urzburg, 2006) p. 54

  50. [50]

    Tamaki, M

    K. Tamaki, M. Curty, and M. Lucamarini, Decoy-state quantum key distribution with a leaky source, New J. Phys. 18, 065008 (2016)

  51. [51]

    Sun and F

    S. Sun and F. Xu, Security of quantum key distribution with source and detection imperfections, New J. Phys. 23, 023011 (2021)

  52. [52]

    X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, Practical decoy state for quantum key distribution, Phys. Rev. A 72, 012326 (2005)

  53. [53]

    H.-K. Lo, M. Curty, and B. Qi, Measurement-device- independent quantum key distribution, Phys. Rev. Lett. 108, 130503 (2012)

  54. [54]

    Zhou, Z.-W

    Y.-H. Zhou, Z.-W. Yu, and X.-B. Wang, Making the decoy-state measurement-device-independent quantum key distribution practically useful, Phys. Rev. A 93, 042324 (2016)

  55. [55]

    W. Wang, F. Xu, and H.-K. Lo, Asymmetric protocols for scalable high-rate measurement-device-independent quantum key distribution networks, Phys. Rev. X 9, 041012 (2019)

  56. [56]

    F. Xu, M. Curty, B. Qi, and H.-K. Lo, Practical aspects of measurement-device-independent quantum key distri- bution, New J. Phys. 15, 113007 (2013)

  57. [57]

    Kashyap and K

    R. Kashyap and K. J. Blow, Observation of catastrophic self-propelled self-focusing in optical fibres, Electron. Lett. 24, 47 (1988)

  58. [58]

    D. D. Davis, S. C. Mettler, and D. J. DiGiovanni, A comparative evaluation of fiber fuse models, Proc. SPIE 2966, 592 (1997)

  59. [59]

    W. Li, V. Zapatero, H. Tan, K. Wei, H. Min, W.-Y. Liu, X. Jiang, S.-K. Liao, C.-Z. Peng, M. Curty, F. Xu, and J.- W. Pan, Experimental quantum key distribution secure against malicious devices, Phys. Rev. Appl. 15, 034081 (2021)

  60. [60]

    W. Li, L. Zhang, H. Tan, Y. Lu, S.-K. Liao, J. Huang, H. Li, Z. Wang, H.-K. Mao, B. Yan, Q. Li, Y. Liu, Q. Zhang, C.-Z. Peng, L. You, F. Xu, and J.-W. Pan, High-rate quantum key distribution exceeding 110 Mb s −1, Nat. Photonics 17, 416 (2023)

  61. [61]

    Cao, Y.-H

    Y. Cao, Y.-H. Li, K.-X. Yang, Y.-F. Jiang, S.-L. Li, X.- L. Hu, M. Abulizi, C.-L. Li, W. Zhang, Q.-C. Sun, W.- Y. Liu, X. Jiang, S.-K. Liao, J.-G. Ren, H. Li, L. You, Z. Wang, J. Yin, C.-Y. Lu, X.-B. Wang, Q. Zhang, C.-Z. Peng, and J.-W. Pan, Long-distance free-space measurement-device-independent quantum key distribu- tion, Phys. Rev. Lett 125, 260503 (2020)

  62. [62]

    K. Wei, W. Li, H. Tan, Y. Li, H. Min, W.-J. Zhang, H. Li, L. You, Z. Wang, X. Jiang, T.-Y. Chen, S.-K. Liao, C.-Z. Peng, F. Xu, and J.-W. Pan, High-speed measurement- device-independent quantum key distribution with inte- grated silicon photonics, Phys. Rev. X10, 031030 (2020)

  63. [63]

    F.-Y. Lu, P. Ye, Z.-H. Wang, S. Wang, Z.-Q. Yin, R. Wang, X.-J. Huang, W. Chen, D.-Y. He, G.-J. Fan- Yuan, G.-C. Guo, and Z.-F. Han, Hacking measurement- device-independent quantum key distribution, Optica10, 520 (2023)

  64. [64]

    Koehler-Sidki, J

    A. Koehler-Sidki, J. Dynes, T. Para¨ ıso, M. Lucamarini, A. W. Sharpe, Z. Yuan, and A. Shields, Backflashes from fast-gated avalanche photodiodes in quantum key distri- bution, Appl. Phys. Lett. 116, 154001 (2020)

  65. [65]

    Molotkov, Trojan horse attacks, decoy state method, and side channels of information leakage in quantum cryptography, J

    S. Molotkov, Trojan horse attacks, decoy state method, and side channels of information leakage in quantum cryptography, J. Exp. Theor. Phys. 130, 809 (2020)

  66. [66]

    Marini, R

    L. Marini, R. Camphausen, B. J. Eggleton, and S. Palomba, Deterministic filtering of breakdown flashing at telecom wavelengths, Appl. Phys. Lett. 111, 213501 (2017)

  67. [67]

    Huang, S

    A. Huang, S. H. Sun, Z. Liu, and V. Makarov, Quantum key distribution with distinguishable decoy states, Phys. Rev. A 98, 012330 (2018)

  68. [68]

    C. C. W. Lim, M. Curty, N. Walenta, F. Xu, and H. Zbinden, Concise security bounds for practical decoy- state quantum key distribution, Phys. Rev. A89, 022307 (2014)