Simulation of Bennet and Brassard 84 protocol with Eve's attacks
A simulation of BB84 protocol of QKD using photonic simulator OptiSystem is demonstrated. The simulation is divided into two categories which are without security attacks scenario and with several attacks scenario that consists of Intercept and Resend and sent new qubits. The simulation results meet...
Main Authors: | Mohamed Halip, Nor Hafizah, Mokhtar, M., Buhari, A. |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
IEEE
2014
|
Online Access: | http://psasir.upm.edu.my/id/eprint/55951/1/Simulation%20of%20Bennet%20and%20Brassard%2084%20protocol%20with%20Eve%27s%20attacks.pdf |
Similar Items
-
Enhanced winnow key reconciliation for bennett-brassard 84 quantum key distribution protocol
by: Qamar, Riaz Ahmad
Published: (2013) -
Enhanced winnow key reconciliation for bennett-brassard 84 quantum key distribution protocol /
by: Riaz Ahmad Qamar, 1959- , author, et al.
Published: (2013) -
Enhanced winnow key reconciliation for bennett-brassard 84 quantum key distribution protocol [electronic resource] /
by: Riaz Ahmad Qamar, 1959-
Published: (2013) -
Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths
by: Masahito Hayashi, et al.
Published: (2014-01-01) -
Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths
by: Masahito Hayashi, et al.
Published: (2012-01-01)