A modeling framework for studying quantum key distribution system implementation nonidealities

LO Mailloux, JD Morris, MR Grimaila, DD Hodson… - IEEE …, 2015 - ieeexplore.ieee.org
Quantum key distribution (QKD) is an innovative technology that exploits the laws of
quantum mechanics to generate and distribute unconditionally secure shared key for use in …

Impact security enhancement in chaotic quantum cryptography

MH Al Hasani, KA Al Naimee - Optics & Laser Technology, 2019 - Elsevier
In this paper the experimental and the numerical study of an optical key distribution quantum
cryptography using BB84 protocol has been achieved. We create secret quantum key and …

qkdSim: An experimenter's simulation toolkit for QKD with imperfections, and its performance analysis with a demonstration of the B92 protocol using heralded photon

R Chatterjee, K Joarder, S Chatterjee… - arXiv preprint arXiv …, 2019 - arxiv.org
Quantum Key Distribution (QKD) is one of the most important aspects of quantum
cryptography. Using laws of quantum mechanics as the basis for security, the key …

The study of security during quantum dense coding in high-dimensions

YX Zhang, C Cao, TJ Wang, C Wang - International Journal of Theoretical …, 2020 - Springer
Here we analyze the security of quantum dense coding protocol in which the keys are
encoded on d-dimensional Hilbert space. The incoherent attack is considered during the …

Quantum key distribution over FSO channel using error reconciliation protocol

B Mallick, P Parida, C Nayak, PK Sahoo, G Palai - Wireless Networks, 2023 - Springer
Quantum key distribution (QKD) has evolved as a robust way of secret key distribution based
on renowned modern physics concepts. To transmit sensitive information in the government …

B92 protocol analysis related to the same basis eavesdropping

B Su, Y Zhou, X Zhou - … on Cloud Computing and Big Data …, 2016 - ieeexplore.ieee.org
Carry out research on the variation rule of the average mutual information between Alice
and Eve I AE, Alice and Bob I AB and bit error rate qe (AE), qe (AB), when the eavesdropper …

Modeling One-way and Two-way quantum key distribution protocols

AM Sofy, M Shalaby, HM Dahshan… - 2019 Ninth …, 2019 - ieeexplore.ieee.org
The present cryptography systems security depends on the hardness of factorizing an
integer number with a large number of digits to its prime integer factors. In 1994, Peter Shor …

An Analysis of the Completion Time of the BB84 Protocol

S Kar, JYL Boudec - arXiv preprint arXiv:2304.10218, 2023 - arxiv.org
The BB84 QKD protocol is based on the idea that the sender and the receiver can reconcile
a certain fraction of the teleported qubits to detect eavesdropping or noise and decode the …

[引用][C] Implementación experimental y computacional del protocolo de distribución cuántica de llaves criptográficas BB84

AÁ Perea - 2019 - Universidad Autónoma de Querétaro