Stop Conditions of BB84 Protocol via a Depolarizing Channel (Quantum Cryptography)
نویسندگان
چکیده
منابع مشابه
Attacks of BB84 protocol in quantum cryptography
An optimal eavesdropping strategy for BB84 protocol in quantum cryptography is proposed. This scheme is based on the ‘indirect copying’. Under this scheme, eavesdropper can exactly obtain the exchanged information between the legitimate users without being detected.
متن کاملSimulation of BB84 Quantum Key Distribution in depolarizing channel
College of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, 310018, China [email protected] Abstract: In this paper, we employ the standard BB84 protocol as the basic model of quantum key distribution (QKD) in depolarizing channel. We also give the methods to express the preparation and measurement of quantum states on classical computer and realize the si...
متن کاملEnhancement of Error Correction in Quantum Cryptography BB84 Protocol
The Quantum Cryptography BB84 protocol has proved to be quite successful in the process of Quantum Key Distribution (QKD). The protocol is used to create a secure key that is shared between two communicating parties. A major phase in this protocol is the correction of errors and discrepancies between keys of sender and receiver. The present work is concerned with enhancing the error correction ...
متن کاملSimulating BB84 Protocol in Dephasing Qubit Channel
BB84 protocol of quantum key distribution had been proved to be absolutely secure. We simulate the rate of secure key distribution in dephasing channel on a classical computer with the method of event-by-event simulation. Theoretically, the private classical capacity of dephasing channel can be obtained in principle, since the channel is degradable. We give the formula of capacity with respect ...
متن کاملSimulation of the BB84 protocol of quantum cryptography by using an intense laser beam
Neste trabalho apresentamos um experimento muito simples explorando a polarização de um feixe laser intenso para simular a distribuição de uma chave criptográfica através do protocolo BB84 de criptografia quântica. Nossa proposta está baseada na analogia entre graus de liberdade de um feixe laser com estados quânticos da luz, muito discutida atualmente. A proposta utiliza duas bases de polariza...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Science
سال: 2007
ISSN: 1549-3636
DOI: 10.3844/jcssp.2007.424.429