Simulation Study of Single Quantum Channel BB84 Quantum Key Distribution

被引:0
|
作者
Foong, Oi-Mean [1 ]
Low, Tang Jung [1 ]
Hong, Kah Wing [1 ]
机构
[1] Univ Teknol PETRONAS, Comp & Informat Sci Dept, Bandar Seri Iskandar 31750, Tronoh, Malaysia
来源
关键词
Quantum Key Distribution; BB84; Cryptosystem; QBER; Raw key efficiencies; COMPUTERS; CRYPTOGRAPHY; SECURITY;
D O I
10.1007/978-981-10-6454-8_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing information being shared online, the vast potential for cybercrime is a serious issue for individuals and businesses. Quantum key distribution (QKD) provides a way for distribution of secure key between two communicating parties. However, the current Quantum Key Distribution method, BB84 protocol, is prone to several weaknesses. These are Photon-Number-Splitting (PNS) attack, high Quantum Bit Error Rate (QBER), and low raw key efficiency. Thus, the objectives of this paper are to investigate the impacts of BB84 protocol towards QBER and raw key efficiencies in single quantum channel. Experiments were set up using a QKD simulator that was developed in Java NetBeans. The simulation study has reaffirmed the results of QBER and raw key efficiencies for the single quantum channel BB84 protocol.
引用
收藏
页码:159 / 167
页数:9
相关论文
共 50 条
  • [1] Simulation of BB84 Quantum Key Distribution in depolarizing channel
    Qiao, Hui
    Chen, Xiao-yu
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 483 - 487
  • [2] Simulation of BB84 and proposed protocol for quantum key distribution
    Kalra, Manish
    Poonia, Ramesh C.
    JOURNAL OF STATISTICS & MANAGEMENT SYSTEMS, 2018, 21 (04): : 661 - 666
  • [3] Security of practical BB84 quantum key distribution
    Inamori, H
    ALGORITHMICA, 2002, 34 (04) : 366 - 371
  • [4] Security of Practical BB84 Quantum Key Distribution
    Algorithmica, 2002, 34 : 366 - 371
  • [5] Eavesdropping Detection in BB84 Quantum Key Distribution Protocols
    Lee, Chankyun
    Sohn, Ilkwon
    Lee, Wonhyuk
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (03): : 2689 - 2701
  • [6] Implementation of BB84 Quantum Key Distribution using OptSim
    Archana, B.
    Krithika, S.
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 457 - 460
  • [7] Quantum scheme for an optimal attack on quantum key distribution protocol BB84
    Kronberg D.A.
    Molotkov S.N.
    Bulletin of the Russian Academy of Sciences: Physics, 2010, 74 (7) : 912 - 918
  • [8] A GAME THEORETIC APPROACH TO STUDY THE QUANTUM KEY DISTRIBUTION BB84 PROTOCOL
    Houshmand, Mahboobeh
    Houshmand, Monireh
    Mashhadi, Habib Rajabi
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2011, 9 (04) : 1133 - 1146
  • [9] Practical quantum digital signature with a gigahertz BB84 quantum key distribution system
    An, Xue-Bi
    Zhang, Hao
    Zhang, Chun-Mei
    Chen, Wei
    Wang, Shuang
    Yin, Zhen-Qiang
    Wang, Qin
    He, De-Yong
    Hao, Peng-Lei
    Liu, Shu-Feng
    Zhou, Xing-Yu
    Guo, Guang-Can
    Han, Zheng-Fu
    OPTICS LETTERS, 2019, 44 (01) : 139 - 142
  • [10] Simulation of BB84 Quantum Key Exchange Protocol and Attack Analysis
    Adiyaman, Ilker Burak
    Sogukpinar, Ibrahim
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2020, : 203 - 207