Uneingeschränkter Zugang

Simulation and Application Purpose of a Randomized Secret Key with Quantum Key Distribution


Zitieren

[1] P. W. Shor, “Algorithms for quantum computation: discrete logarithms and factoring,” in Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, Nov. 1994, pp. 124–134. https://doi.org/10.1109/SFCS.1994.36570010.1109/SFCS.1994.365700 Search in Google Scholar

[2] P. W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM Journal on Computing, vol. 26, no. 5, pp. 1484–1509, 1997. https://doi.org/10.1137/S009753979529317210.1137/S0097539795293172 Search in Google Scholar

[3] J. L. Park, “The concept of transition in quantum mechanics,” Found Phys, vol. 1, pp. 23–33, Mar. 1970. https://doi.org/10.1007/BF0070865210.1007/BF00708652 Search in Google Scholar

[4] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, Dec. 1984, pp. 175–179. Search in Google Scholar

[5] C. H. Bennett, “Quantum cryptography using any two nonorthogonal states”, Physical review letters, vol. 68, pp. 3121–3124, 1992, https://10.1103/physrevlett.68.312110.1103/PhysRevLett.68.312110045619 Search in Google Scholar

[6] A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Physical review letters, vol. 67, pp. 661–663, 1991. https://10.1103/PhysRevLett.67.66110.1103/PhysRevLett.67.66110044956 Search in Google Scholar

[7] S. Mishra et al., “BBM92 quantum key distribution over a free space dusty channel of 200 meters”, Journal of Optics, vol. 24, no. 7, pp. 074002, 2022. https://doi.org/10.48550/arXiv.2112.1196110.1088/2040-8986/ac6f0b Search in Google Scholar

[8] A. Buhari, Z. A. Zukarnain, S. K. Subramaniam, H. Zainuddin, and S. Saharudin, “An efficient modeling and simulation of quantum key distribution protocols using OptiSystem,” in 2012 IEEE Symposium on Industrial Electronics and Applications, Bandung, Indonesia, Sep. 2012, pp. 84–89. https://doi.org/10.1109/ISIEA.2012.649667710.1109/ISIEA.2012.6496677 Search in Google Scholar

[9] B. Archana and S. Krithika, “Implementation of BB84 quantum key distribution using OptSim,” in 2015 2nd International Conference on Electronics and Communication Systems (ICECS), Coimbatore, India, Feb. 2015, pp. 457–460. https://doi.org/10.1109/ECS.2015.712494610.1109/ECS.2015.7124946 Search in Google Scholar

[10] O. Grote, A. Ahrens, and C. Benavente-Peces, “Modelling and simulation of quantum key distribution using OptSim,” in 2021 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW), Riga, Latvia, Oct. 2021, pp. 160–164. https://doi.org/10.1109/MTTW53539.2021.960716510.1109/MTTW53539.2021.9607165 Search in Google Scholar

[11] Synopsys. OptSim, Software for Design and Simulation of Optical communication. [Online]. Available: https://www.synopsys.com/photonic-solutions/optsim/single-modenetwork.html. [Accessed on: Dec. 13, 2021]. Search in Google Scholar

[12] S. Pirandola et al., “Advances in quantum cryptography”, Advances in Optics and Photonics, vol. 12, no. 4, pp. 1012–1236, 2020. https://doi.org/10.1364/AOP.36150210.1364/AOP.361502 Search in Google Scholar

[13] S. Flammia and J. Wallman, “Efficient estimation of Pauli channels”, ACM Transactions on Quantum Computing, vol.1, no. 1, Art. no. 3, Dec. 2020. https://doi.org/10.1145/340803910.1145/3408039 Search in Google Scholar

[14] X. Wang, “Perfect random number generator is unnecessary for secure quantum key distribution”, 2004, arXiv:quant-ph/0405182v2. Search in Google Scholar

[15] A. Boaron et al., “Secure quantum key distribution over 421 km of optical fiber”, Physical Review Letters, vol. 121, Art. no. 190502, Nov. 2018. https://doi.org/10.1103/PhysRevLett.121.19050210.1103/PhysRevLett.121.19050230468607 Search in Google Scholar

eISSN:
2255-9159
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
2 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Technik, Einführungen und Gesamtdarstellungen, andere