Stop Conditions of BB84 Protocol via a Depolarizing Channel (Quantum Cryptography)

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attacks of BB84 protocol in quantum cryptography

An optimal eavesdropping strategy for BB84 protocol in quantum cryptography is proposed. This scheme is based on the ‘indirect copying’. Under this scheme, eavesdropper can exactly obtain the exchanged information between the legitimate users without being detected.

متن کامل

Simulation of BB84 Quantum Key Distribution in depolarizing channel

College of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, 310018, China [email protected] Abstract: In this paper, we employ the standard BB84 protocol as the basic model of quantum key distribution (QKD) in depolarizing channel. We also give the methods to express the preparation and measurement of quantum states on classical computer and realize the si...

متن کامل

Enhancement of Error Correction in Quantum Cryptography BB84 Protocol

The Quantum Cryptography BB84 protocol has proved to be quite successful in the process of Quantum Key Distribution (QKD). The protocol is used to create a secure key that is shared between two communicating parties. A major phase in this protocol is the correction of errors and discrepancies between keys of sender and receiver. The present work is concerned with enhancing the error correction ...

متن کامل

Simulating BB84 Protocol in Dephasing Qubit Channel

BB84 protocol of quantum key distribution had been proved to be absolutely secure. We simulate the rate of secure key distribution in dephasing channel on a classical computer with the method of event-by-event simulation. Theoretically, the private classical capacity of dephasing channel can be obtained in principle, since the channel is degradable. We give the formula of capacity with respect ...

متن کامل

Simulation of the BB84 protocol of quantum cryptography by using an intense laser beam

Neste trabalho apresentamos um experimento muito simples explorando a polarização de um feixe laser intenso para simular a distribuição de uma chave criptográfica através do protocolo BB84 de criptografia quântica. Nossa proposta está baseada na analogia entre graus de liberdade de um feixe laser com estados quânticos da luz, muito discutida atualmente. A proposta utiliza duas bases de polariza...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Science

سال: 2007

ISSN: 1549-3636

DOI: 10.3844/jcssp.2007.424.429