scholarly journals qkdSim, a Simulation Toolkit for Quantum Key Distribution Including Imperfections: Performance Analysis and Demonstration of the B92 Protocol Using Heralded Photons

2020 ◽  
Vol 14 (2) ◽  
Author(s):  
Rishab Chatterjee ◽  
Kaushik Joarder ◽  
Sourav Chatterjee ◽  
Barry C. Sanders ◽  
Urbasi Sinha
2020 ◽  
Vol 57 (15) ◽  
pp. 150604
Author(s):  
黄超 Huang Chao ◽  
李云霞 Li Yunxia ◽  
蒙文 Meng Wen ◽  
武天雄 Wu Tianxiong

2020 ◽  
Vol 29 (2) ◽  
pp. 020301
Author(s):  
Shu-Jing Zhang ◽  
Chen Xiao ◽  
Chun Zhou ◽  
Xiang Wang ◽  
Jian-Shu Yao ◽  
...  

2017 ◽  
Vol 7 (2) ◽  
pp. 212 ◽  
Author(s):  
Logan Mailloux ◽  
Michael Grimaila ◽  
Douglas Hodson ◽  
Ryan Engle ◽  
Colin McLaughlin ◽  
...  

2011 ◽  
Vol 60 (3) ◽  
pp. 030304
Author(s):  
Wang Han ◽  
Yan Lian-Shan ◽  
Pan Wei ◽  
Luo Bin ◽  
Guo Zhen ◽  
...  

Author(s):  
Catalin Anghel

This paper presents the development, comparison and analysis of several implementations of the B92 Quantum Key Distribution (QKD) protocol. In order to achieve this objective a prototype which consists of traditional (non-quantum) simulators was created, one for B92 protocol, one for B92 protocol with eavesdropper and one for B92 protocol with Quantum Bit Travel Time (QBTT) eavesdropper detection method. The principles of quantum mechanics were studied, as a foundation of quantum cryptography, for the realization of simulation programs that were written in C ++, focusing mainly on the B92 protocol and QBTT eavesdropper detection method. We compared the Quantum Bit Error Rate (QBER) for implementation of B92 protocol without eavesdropper, B92 protocol with eavesdropper and B92 protocol with QBTT eavesdropper detection method and found that QBTT eavesdropper detection method significantly reduces the QBER from the final key.


Author(s):  
D. B. Horoshko ◽  
S. Ya. Kilin

We consider an unambiguous state discrimination attack on the B92 protocol of quantum key distribution, realized on the basis of polarization encoding of photons produced by a single-photon source. We calculate the secure key rate and the maximal tolerable loss for various overlaps between two signal states employed in this protocol. We make also a comparison with a physically impossible attack of perfect quantum cloning, and show that the unambiguous state discrimination is much more dangerous for the B92 protocol, than this attack, demonstrating thus, that the security of quantum key distribution is not always based on the no-cloning theorem.


Sign in / Sign up

Export Citation Format

Share Document