Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack
Ma Hong-Xin
1, 2
, Bao Wan-Su
1, 2, †,
, Li Hong-Wei
1, 2
, Chou Chun
1, 2
The equivalent scheme to figure 1 with post processing when Alice is switched ON.