nanoll extt
Please use this identifier to cite or link to this item: http://lrcdrs.bennett.edu.in:80/handle/123456789/1382
Title: Experimental realization of three quantum key distribution protocols
Authors: Warke, Aakash
Keywords: Quantum cryptography, IBM quantum experience, Quantum information theory
Issue Date: 2020
Publisher: Springer
Abstract: Classical computers allow security of cryptographic protocols based on the mathematical complexity of encoding functions and the shared key. This implies that high computational power can have a positive outcome in breaking cryptographic protocols that employ classical computers. Quantum machines claim to possess such power. Two parties interested in communicating with each other take up the process of measuring entangled states in order to construct a secret key which is safeguarded against an eavesdropper capable of performing quantum operations. At first, experimental verification of the BB84 protocol using three bases has been performed in this paper, out of which sub-cases have been considered based on whether or not Eve has attempted an attack. The following part includes experimental realization of the B92 protocol which was introduced by Charles Bennett in the year 1992. Possibility of an Eve’s attack is considered and implemented. Succeeding part relies on experimental implementation of the protocol that was introduced by Acin, Massar and Pironio in the year 2006 (New J Phys 8:126, 2006). All the implementations have been done using the IBM Quantum Experience platform.
URI: https://doi.org/10.1007/s11128-020-02914-z
http://lrcdrs.bennett.edu.in:80/handle/123456789/1382
ISSN: 1570-0755
Appears in Collections:Journal Articles_ECE

Files in This Item:
File SizeFormat 
517.pdf
  Restricted Access
1.48 MBAdobe PDFView/Open Request a copy

Contact admin for Full-Text

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.