Secure quantum key distribution with a subset of malicious devices
Abstract The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security, as, typically, neither end users nor QKD manufacturers can validate the integrity of every component of their QKD cartoon martian with big head system in practice.One possible approach to re-establish the security of QKD is to use a r