Have a personal or library account? Click to login
Simulation and Application Purpose of a Randomized Secret Key with Quantum Key Distribution Cover

Simulation and Application Purpose of a Randomized Secret Key with Quantum Key Distribution

By: Olaf Grote and  Andreas Ahrens  
Open Access
|Jan 2023

References

  1. [1] P. W. Shor, “Algorithms for quantum computation: discrete logarithms and factoring,” in Proceedings 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, Nov. 1994, pp. 124–134. https://doi.org/10.1109/SFCS.1994.36570010.1109/SFCS.1994.365700
  2. [2] P. W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM Journal on Computing, vol. 26, no. 5, pp. 1484–1509, 1997. https://doi.org/10.1137/S009753979529317210.1137/S0097539795293172
  3. [3] J. L. Park, “The concept of transition in quantum mechanics,” Found Phys, vol. 1, pp. 23–33, Mar. 1970. https://doi.org/10.1007/BF0070865210.1007/BF00708652
  4. [4] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, Dec. 1984, pp. 175–179.
  5. [5] C. H. Bennett, “Quantum cryptography using any two nonorthogonal states”, Physical review letters, vol. 68, pp. 3121–3124, 1992, https://10.1103/physrevlett.68.312110.1103/PhysRevLett.68.312110045619
  6. [6] A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Physical review letters, vol. 67, pp. 661–663, 1991. https://10.1103/PhysRevLett.67.66110.1103/PhysRevLett.67.66110044956
  7. [7] S. Mishra et al., “BBM92 quantum key distribution over a free space dusty channel of 200 meters”, Journal of Optics, vol. 24, no. 7, pp. 074002, 2022. https://doi.org/10.48550/arXiv.2112.1196110.1088/2040-8986/ac6f0b
  8. [8] A. Buhari, Z. A. Zukarnain, S. K. Subramaniam, H. Zainuddin, and S. Saharudin, “An efficient modeling and simulation of quantum key distribution protocols using OptiSystem,” in 2012 IEEE Symposium on Industrial Electronics and Applications, Bandung, Indonesia, Sep. 2012, pp. 84–89. https://doi.org/10.1109/ISIEA.2012.649667710.1109/ISIEA.2012.6496677
  9. [9] B. Archana and S. Krithika, “Implementation of BB84 quantum key distribution using OptSim,” in 2015 2nd International Conference on Electronics and Communication Systems (ICECS), Coimbatore, India, Feb. 2015, pp. 457–460. https://doi.org/10.1109/ECS.2015.712494610.1109/ECS.2015.7124946
  10. [10] O. Grote, A. Ahrens, and C. Benavente-Peces, “Modelling and simulation of quantum key distribution using OptSim,” in 2021 IEEE Microwave Theory and Techniques in Wireless Communications (MTTW), Riga, Latvia, Oct. 2021, pp. 160–164. https://doi.org/10.1109/MTTW53539.2021.960716510.1109/MTTW53539.2021.9607165
  11. [11] Synopsys. OptSim, Software for Design and Simulation of Optical communication. [Online]. Available: https://www.synopsys.com/photonic-solutions/optsim/single-modenetwork.html. [Accessed on: Dec. 13, 2021].
  12. [12] S. Pirandola et al., “Advances in quantum cryptography”, Advances in Optics and Photonics, vol. 12, no. 4, pp. 1012–1236, 2020. https://doi.org/10.1364/AOP.36150210.1364/AOP.361502
  13. [13] S. Flammia and J. Wallman, “Efficient estimation of Pauli channels”, ACM Transactions on Quantum Computing, vol.1, no. 1, Art. no. 3, Dec. 2020. https://doi.org/10.1145/340803910.1145/3408039
  14. [14] X. Wang, “Perfect random number generator is unnecessary for secure quantum key distribution”, 2004, arXiv:quant-ph/0405182v2.
  15. [15] A. Boaron et al., “Secure quantum key distribution over 421 km of optical fiber”, Physical Review Letters, vol. 121, Art. no. 190502, Nov. 2018. https://doi.org/10.1103/PhysRevLett.121.19050210.1103/PhysRevLett.121.19050230468607
Language: English
Page range: 43 - 49
Published on: Jan 19, 2023
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2023 Olaf Grote, Andreas Ahrens, published by Riga Technical University
This work is licensed under the Creative Commons Attribution 4.0 License.