A modeling framework for studying quantum key distribution system implementation nonidealities
LO Mailloux, JD Morris, MR Grimaila, DD Hodson… - IEEE …, 2015 - ieeexplore.ieee.org
Quantum key distribution (QKD) is an innovative technology that exploits the laws of
quantum mechanics to generate and distribute unconditionally secure shared key for use in …
quantum mechanics to generate and distribute unconditionally secure shared key for use in …
Impact security enhancement in chaotic quantum cryptography
MH Al Hasani, KA Al Naimee - Optics & Laser Technology, 2019 - Elsevier
In this paper the experimental and the numerical study of an optical key distribution quantum
cryptography using BB84 protocol has been achieved. We create secret quantum key and …
cryptography using BB84 protocol has been achieved. We create secret quantum key and …
qkdSim: An experimenter's simulation toolkit for QKD with imperfections, and its performance analysis with a demonstration of the B92 protocol using heralded photon
R Chatterjee, K Joarder, S Chatterjee… - arXiv preprint arXiv …, 2019 - arxiv.org
Quantum Key Distribution (QKD) is one of the most important aspects of quantum
cryptography. Using laws of quantum mechanics as the basis for security, the key …
cryptography. Using laws of quantum mechanics as the basis for security, the key …
The study of security during quantum dense coding in high-dimensions
Here we analyze the security of quantum dense coding protocol in which the keys are
encoded on d-dimensional Hilbert space. The incoherent attack is considered during the …
encoded on d-dimensional Hilbert space. The incoherent attack is considered during the …
Quantum key distribution over FSO channel using error reconciliation protocol
Quantum key distribution (QKD) has evolved as a robust way of secret key distribution based
on renowned modern physics concepts. To transmit sensitive information in the government …
on renowned modern physics concepts. To transmit sensitive information in the government …
B92 protocol analysis related to the same basis eavesdropping
B Su, Y Zhou, X Zhou - … on Cloud Computing and Big Data …, 2016 - ieeexplore.ieee.org
Carry out research on the variation rule of the average mutual information between Alice
and Eve I AE, Alice and Bob I AB and bit error rate qe (AE), qe (AB), when the eavesdropper …
and Eve I AE, Alice and Bob I AB and bit error rate qe (AE), qe (AB), when the eavesdropper …
Modeling One-way and Two-way quantum key distribution protocols
AM Sofy, M Shalaby, HM Dahshan… - 2019 Ninth …, 2019 - ieeexplore.ieee.org
The present cryptography systems security depends on the hardness of factorizing an
integer number with a large number of digits to its prime integer factors. In 1994, Peter Shor …
integer number with a large number of digits to its prime integer factors. In 1994, Peter Shor …
An Analysis of the Completion Time of the BB84 Protocol
S Kar, JYL Boudec - arXiv preprint arXiv:2304.10218, 2023 - arxiv.org
The BB84 QKD protocol is based on the idea that the sender and the receiver can reconcile
a certain fraction of the teleported qubits to detect eavesdropping or noise and decode the …
a certain fraction of the teleported qubits to detect eavesdropping or noise and decode the …
[引用][C] Implementación experimental y computacional del protocolo de distribución cuántica de llaves criptográficas BB84
AÁ Perea - 2019 - Universidad Autónoma de Querétaro