A Study of Various Quantum Cryptographic Architectures and an Efficient Implementation in Present Scenario and Results BB84 Protocol -A Practical Overview
نویسندگان
چکیده
Quantum Cryptography is also a Promising Approach visible of final Quantum Computers existence. it is a singular study Technique that provides us a singular secret Protocol that cannot be glorious by anybody. Quantum Cryptography holds foot on laws of Physics The quantum physics Law, however not as like that we have a tendency to area unit victimization addition, multiplication kind of arithmetic Puzzles used in PGP (Pretty smart
منابع مشابه
Improving efficiency of quantum key distribution with probabilistic measurements
The first part of this paper presents two efficient cryptographic protocols, based on quantum entanglement, for secure exchange of secret keys. While the first protocol requires storage of entangled qubits, the second protocol has no storage requirements and presents a probabilistic model. We show that there is a tradeoff between security against eavesdropping and the efficiency of the protocol...
متن کاملEffect of channel imperfection on the secrecy capacity of a quantum cryptographic system
A realistic quantum cryptographic system must function in the presence of noise and channel loss inevitable in any practical transmission. We examine the effects of these channel limitations on the security and throughput of a class of quantum cryptographic protocols known as four-state, or BB84. Provable unconditional security against eavesdropping, which is the principal feature of quantum cr...
متن کاملDetector decoy quantum key distribution
Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is specially suited for t...
متن کاملConstructing CSS Codes with LDPC Codes for the BB84 Quantum Key Distribution Protocol
Abstract—In this paper, we propose how to simply construct a pair of linear codes for the BB84 quantum key distribution protocol. This protocol allows unconditional security in the presence of an eavesdropper, and the pair of linear codes is used for error correction and privacy amplification. Since their high decoding performance implies low eavesdropper’s mutual information, good design of th...
متن کاملQuantum Cryptography : On the Security of the BB84 Key-Exchange Protocol
In 1984, C.H. Bennet and G. Brassard proposed a new protocol aimed to solve the problem of symmetric cryptographic key exchange. This protocol was called BB84 after the name of its authors. While a traditional method would rely on public key cryptography (like RSA), the BB84 protocol takes benefit of the laws of quantum mechanics, like for example the fact that any quantum measurement can pertu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014