Bases selection with pseudo-random functions in BB84 scheme
Because the spectrum of services available in modern telecommunication networks is constantly expanding, security has become increasingly important. Simultaneously, in an era of constant progress in mathematics and computing, the security of existing cryptographic solutions becomes questionable. Qua...
Main Authors: | Emir Dervisevic, Miroslav Voznak, Miralem Mehic |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2024-01-01
|
Series: | Heliyon |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2405844023107869 |
Similar Items
-
FPGA-Based Implementation of an Underwater Quantum Key Distribution System With BB84 Protocol
by: Burak Kebapci, et al.
Published: (2023-01-01) -
Development of Quantum Protocol Modification CSLOE–2022, Increasing the Cryptographic Strength of Classical Quantum Protocol BB84
by: Larissa V. Cherckesova, et al.
Published: (2022-11-01) -
Semi device independence of the BB84 protocol
by: Erik Woodhead
Published: (2016-01-01) -
Security of the Decoy-State BB84 Protocol with Imperfect State Preparation
by: Aleksei Reutov, et al.
Published: (2023-11-01) -
Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation
by: Carlos Cardoso-Isidoro, et al.
Published: (2022-04-01)