V. I. Egorov

ORCID: 0000-0003-0767-0261
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Information and Cryptography
  • Quantum Mechanics and Applications
  • Quantum Computing Algorithms and Architecture
  • Optical Network Technologies
  • Quantum optics and atomic interactions
  • Laser-Matter Interactions and Applications
  • Advanced Photonic Communication Systems
  • Laser Applications in Dentistry and Medicine
  • Nanocluster Synthesis and Applications
  • Laser-Ablation Synthesis of Nanoparticles
  • Atmospheric chemistry and aerosols
  • Engineering Technology and Methodologies
  • Gold and Silver Nanoparticles Synthesis and Applications
  • Atmospheric and Environmental Gas Dynamics
  • Quantum-Dot Cellular Automata
  • Laser Design and Applications
  • Photonic and Optical Devices
  • Optical Wireless Communication Technologies
  • Chaos-based Image/Signal Encryption
  • Advanced Optical Network Technologies
  • Ocular and Laser Science Research
  • Air Quality Monitoring and Forecasting
  • Cold Atom Physics and Bose-Einstein Condensates
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Neural Networks and Reservoir Computing

ITMO University
2015-2024

Quantum (Australia)
2022

Institute of Information Technologies
2014

Institute of Global Climate and Ecology
2002-2013

Roshydromet
2013

A quantum key distribution system based on the subcarrier wave modulation method has been demonstrated which employs BB84 protocol with a strong reference to generate secure bits at rate of 16.5 kbit/s an error 0.5% over optical channel 10 dB loss, and 18 bits/s 0.75% 25 loss. To best our knowledge, these results represent highest loss reported for using approach. passive unidirectional scheme used compensate polarization dependence phase modulators in receiver module, resulted high...

10.1364/oe.24.002619 article EN cc-by Optics Express 2016-02-02

Many quantum key distribution systems employ a laser followed by an optical attenuator to prepare weak coherent states in the source. Their mean photon number must be precalibrated guarantee security of distribution. Here we experimentally show that this calibration can broken with high-power attack. We test four fiber-optic types used systems, and find two them exhibit permanent decrease attenuation after damage. This results higher numbers prepared may allow eavesdropper compromise key.

10.1103/physrevapplied.13.034017 article EN Physical Review Applied 2020-03-05

A well-protected and characterized source in a quantum key distribution system is needed for its security. Unfortunately, the vulnerable to light-injection attacks, such as Trojan-horse, laser-seeding, laser-damage which an eavesdropper actively injects bright light hack unit. The hacking laser could be high-power one that can modify properties of components via attack also further help Trojan-horse other attacks. Here we propose countermeasure against consisting additional sacrificial...

10.1103/prxquantum.3.040307 article EN cc-by PRX Quantum 2022-10-14

Analysis of methods for utilizing by-products livestock farming allowed us to develop a promising concept accelerated technology processing litterless manure as part an organomineral mixture. The basis the is separation liquid and solid fractions already in barn and, accordingly, subsequent separate processing, disinfection introduction fractions. In this case, sterility fraction taken into account, therefore, its without processing. undergoes successive disinfection, mixing with fillers,...

10.12737/2073-0462-2025-1-82-92 article EN Vestnik of Kazan state agrarin university 2025-04-09

We experimentally demonstrate that a single-photon detector ID210 commercially available from ID Quantique is vulnerable to blinding and can be fully controlled by bright illumination.In quantum key distribution, this vulnerability exploited an eavesdropper perform fakedstate attack giving her full knowledge of the without being noticed.We consider on standard BB84 protocol subcarrier-wave scheme, outline possible countermeasure.

10.1364/oe.27.032253 article EN cc-by Optics Express 2019-10-22

Although quantum communication systems are being deployed on a global scale, their realistic security certification is not yet available. Here we present evaluation and improvement protocol for complete systems. The subdivides system by defining seven implementation sub-layers based hierarchical order of information flow; then it categorises the known imperfections hardness protection practical risk. Next, an initial analysis report lists all potential loopholes in its quantum-optical part....

10.1038/s41598-021-84139-3 article EN cc-by Scientific Reports 2021-03-03

We demonstrate qubit transmission via an optical cable in a metropolitan area network using quantum communications sidebands with record-setting system parameters for such systems mode. The sifted-key generation rate was 1.06 Mbits/s losses of 1.63 dB and error coefficient 1%.

10.1364/jot.84.000362 article EN Journal of Optical Technology 2017-06-01

We present a scheme of quantum repeater that uses entangled multimode coherent states are obtained by electro-optic modulation symmetric and antisymmetric Schr\"odinger cat states. Part the generated frequency modes is sent to beam splitter at central node, while remaining stored locally in memories. The between remote memories conditionally prepared photon-counting measurements output channels splitter. study how effects decoherence channel affect statistics photocounts and, for heralding...

10.1103/physrevapplied.20.044030 article EN Physical Review Applied 2023-10-11

Quantum cryptography allows distributing secure keys between two users so that any performed eavesdropping attempt would be immediately discovered. However, in practice an eavesdropper can obtain key information from multi-photon states when attenuated laser radiation is used as a source of quantum states. In order to prevent actions eavesdropper, it generally suggested implement special cryptographic protocols, like decoy or SARG04. this paper, we describe alternative method based on...

10.1088/1742-6596/735/1/012072 article EN Journal of Physics Conference Series 2016-08-01

This article describes the current technical level of developments in field continuous-variable quantum key distribution (CV-QKD). Various classifications are described, criteria analyzed, and optimal protocol is selected. The analysis focused around device-dependent schemes with a theoretical emphasis, therefore, detailed device-independent CV-QKD side-channel attacks out scope work. However, latter, one way or another, taken into account when describing possible classifications. choice was...

10.3390/opt3040030 article EN cc-by Optics 2022-09-21

We experimentally demonstrate quantum communication in 10 dB loss outdoor atmospheric channel with 5 kbit/s bitrate using subcarrier wave coding method. Free-space link was organized by telescoping system symmetric fiber-optic collimators.

10.1088/1742-6596/917/5/052003 article EN Journal of Physics Conference Series 2017-11-01

We examine different methods to implement coherent detection in subcarrier wave quantum key distribution (SCW QKD) systems. For classical fields, we present the models describing homodyne-type and heterodyne-type schemes needed extract information from quadrature phase-coded multimode signals used SCW QKD. Practical feasibility of proposed is corroborated by experiments.

10.1364/josab.424516 article EN Journal of the Optical Society of America B 2021-06-11

In this paper, we continue the study of quantum cryptographic GG02 protocol, performed using approach based on subcarrier waves. We modify scheme via heterodyne detection and perform security analysis for full trusted hardware noise model in presence collective attacks with finite-key effects. It is shown that system can potentially distribute key even if level losses channel above 9 dB. This result consistent general technical comply modern standards practical CV-QKD systems. Finally, under...

10.18287/2412-6179-co-1225 article EN cc-by Computer Optics 2023-04-24

In this paper we report a continuous-variable quantum key distribution protocol using multimode coherent states generated on subcarrier frequencies of the optical spectrum. To detect quadrature components bosonic field propose detection scheme where power from carrier wave is used as local oscillator. We compose mathematical model proposed and perform its security analysis in finite-size regime fully asymptotic equipartition property technique. calculate lower bound secret rate for system...

10.1038/s41598-020-66948-0 article EN cc-by Scientific Reports 2020-06-22

Theoretical research and numerical simulation of the noise influence caused by spontaneous Raman scattering, four-wave mixing, linear channel cross talk on performances quantum key distribution (QKD) systems were conducted. Three types QKD considered: a coherent one-way protocol, subcarrier-wave system, continuous-variable integrated with classical dense wavelength division multiplexing (DWDM) channels. We calculate secure generation rate for mentioned addressing different allocation schemes...

10.1364/josab.469933 article EN Journal of the Optical Society of America B 2022-11-14

It is shown that the action of a nanosecond pulse laser radiation with wavelengths 0.53 and 1.06 μm on glass waveguide layer contains silver ions causes nanoparticles to be formed surface glass. The are fixed by dielectric components A mechanism proposed for formation when acts.

10.1364/jot.81.000270 article EN Journal of Optical Technology 2014-05-01

Vulnerabilities of components used in quantum key distribution (QKD) systems affect its implementation security and must be taken into consideration during system development analysis. In this paper, we investigated transmission fiber optical elements, which are commonly QKD for designing countermeasures against Trojan-horse attacks, 1500-2100 nm range. As a result, found loopholes their spectra open possibilities eavesdropping. We also suggested simple passive countermeasure based on...

10.1103/physrevapplied.20.014038 article EN Physical Review Applied 2023-07-18

In this paper we investigate the chromatic dispersion impact on quantum key distribution system based multi-mode weak coherent phase-coded states. We provide an asymptotic secure rate estimation, taking into account error detection probability due to dispersion. demonstrate numerically and experimentally that effect of in optical fiber without any compensation hinders secret at a distance more than 53 km. Finally, propose modification considered communication order mitigate influence its performance.

10.1364/oe.403293 article EN cc-by Optics Express 2020-09-01

We discuss a method for revealing photon-number-splitting (PNS) attack in quantum key distribution (QKD) system, which is based on analyzing the statistical of photon numbers detected each time interval. A relation estimating difference between expected photon-number and one appearing course PNS derived. An equation defining minimum number counts necessary with desired probability given. Formulas calculating amount raw keys known to an illegitimate user due are obtained depending system's...

10.1364/josab.33.001451 article EN Journal of the Optical Society of America B 2016-06-14

Subject of study. Two-way continuous-variable quantum key distribution schemes are studied. Aim. This study aims to prove the security plug-and-play system in context model trusted noise from legitimate users. Method. Based on an analog well-known implementation format, performance such a operating under GG02 protocol is evaluated. The evaluation conducted presence collective attacks, considering finite-key effects. Main results. A secure that satisfies composability criteria can be...

10.1364/jot.89.000430 article EN Journal of Optical Technology 2022-07-01

This paper introduces a model of Grover's algorithm suitable for implementation in linear photonic chip. We compare two known realizations its main components, two-qubit CZ gates, order to define optimal chip architecture. The operation is simulated considering directional coupler imperfection influence on the scheme parameters. also determined tolerance boundaries distortions dimensions.

10.1088/1402-4896/ab6523 article EN Physica Scripta 2019-12-23
Coming Soon ...