A Comparison of Several Implementations of B92 Quantum Key Distribution Protocol

被引:3
作者
Anghel, Caralin [1 ]
Istrate, Adrian [1 ]
Vlase, Mihai [1 ]
机构
[1] Duneirea de Jos Univ Galati, Comp Sci & Informat Technol, Galati, Romania
来源
2022 26TH INTERNATIONAL CONFERENCE ON SYSTEM THEORY, CONTROL AND COMPUTING (ICSTCC) | 2022年
关键词
quantum cryptography; quantum key distribution; qkd; quantum protocol; B92; protocol; QBTT eavesdropper detection method; qbit; SECURITY;
D O I
10.1109/ICSTCC55426.2022.9931799
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the development, comparison, and analysis of several implementations of the B92 Quantum Key Distribution (QKD) protocol. To achieve this goal three prototypes which consists of traditional simulators (non-quantum) were created, one for the B92 protocol, one for the B92 protocol with an eavesdropper, and one for the B92 protocol with the Quantum Bit Travel Time (QBTT) eavesdropper detection method. The principles of quantum mechanics were studied, as a foundation of quantum cryptography, for the implementation of the simulation programs that were written in C ++, focusing mainly on the B92 protocol and QBTT eavesdropper detection method. We compared the Quantum Bit Error Rate (QBER) for the implementation of the B92 protocol without an eavesdropper, the B92 protocol with an eavesdropper and the B92 protocol with the QBTT eavesdropper detection method and found that the latest one significantly reduces the QBER from the final key.
引用
收藏
页码:374 / 379
页数:6
相关论文
共 9 条
[1]  
Anghel C., 2011, ANN DUNAREA JOS, V34, P1
[2]  
[Anonymous], 1984, P IEEE INT C COMP SY, DOI DOI 10.1016/J.TCS.2014.05.025
[3]  
Bell J. S., 1964, PHYSICS, V1, P195, DOI 10.1103/PhysicsPhysiqueFizika.1.195
[4]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[5]   Unconditional security of practical quantum key distribution [J].
Inamori, H. ;
Lutkenhaus, N. ;
Mayers, D. .
EUROPEAN PHYSICAL JOURNAL D, 2007, 41 (03) :599-627
[6]   Effects of detector efficiency mismatch on security of quantum cryptosystems [J].
Makarov, Vadim ;
Anisimov, Andrey ;
Skaar, Johannes .
PHYSICAL REVIEW A, 2006, 74 (02)
[7]   The security of practical quantum key distribution [J].
Scarani, Valerio ;
Bechmann-Pasquinucci, Helle ;
Cerf, Nicolas J. ;
Dusek, Miloslav ;
Luetkenhaus, Norbert ;
Peev, Momtchil .
REVIEWS OF MODERN PHYSICS, 2009, 81 (03) :1301-1350
[8]   A fully automated entanglement-based quantum cryptography system for telecom fiber networks [J].
Treiber, Alexander ;
Poppe, Andreas ;
Hentschel, Michael ;
Ferrini, Daniele ;
Loruenser, Thomas ;
Querasser, Edwin ;
Matyus, Thomas ;
Huebel, Hannes ;
Zeilinger, Anton .
NEW JOURNAL OF PHYSICS, 2009, 11
[9]   Software development for b92 quantum key distribution communication protocol [J].
Wijesekera, Shirantha ;
Palit, Sajal ;
Balachandran, Bala .
6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, :274-+