Showing 1 - 16 results of 16 for search '"BB84"', query time: 0.05s Refine Results
  1. 1

    Implemetation of BB84 quantum key distribution protocol’s with attacks. by Muhammad, Nur Atiqah, Ahmad Zulkarnain, Zuriati

    Published 2009
    “…This paper discusses the implementation of QKD protocol (BB84 protocol), which is widely used today. The implementation simulates the communication of two parties who wish to share a secret key with the existing of eavesdropper. …”
    Get full text
    Article
  2. 2

    Fiber and free-space practical decoy state QKD for both BB84 and SARG04 protocols by Ali, Sellami, Wahiddin, Mohamed Ridza

    Published 2010
    “…Fiber and free-space practical decoy state quantum key distribution has been simulated for both BB84 and SARG04 protocols. The numerical simulation has shown that the fiber based QKD and free space QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04…”
    Get full text
    Article
  3. 3

    Simulation of Bennet and Brassard 84 protocol with Eve's attacks by Mohamed Halip, Nor Hafizah, Mokhtar, M., Buhari, A.

    Published 2014
    “…A simulation of BB84 protocol of QKD using photonic simulator OptiSystem is demonstrated. …”
    Get full text
    Conference or Workshop Item
  4. 4

    Practical quantum key distribution by Ali, Sellami

    Published 2012
    “…We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. …”
    Get full text
    Book Chapter
  5. 5

    Estimation of decoy state parameters for practical QKD by Ali, Sellami, Mahmoud, Omer, Saeed, Rashid Abdelhaleem

    Published 2011
    “…We have presented a method to estimate parameters of the decoy state method based on one decoy state protocol for both BB84 and SARG04. This method has given different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. …”
    Get full text
    Article
  6. 6

    Alternative discrete variable protocol for point to point Quantum Key Distribution system by Ahmad Ghazali, Lizal Iswady

    Published 2012
    “…The SARG04 is more robust against photon number splitting attacks and double the BB84 critical transmission distance. Nevertheless SARG04 protocol still has lower percentage of sifted key bit compared to BB84 protocol. …”
    Get full text
    Thesis
  7. 7

    Quantum key distribution protocols in transmission control protocol by Kamarul Aizan, Nur Hanani

    Published 2012
    “…This research has developed a simulator software for BB84 and B92 protocols which implemented both protocols in 802.11i WLAN environment. …”
    Get full text
    Thesis
  8. 8

    Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme by Shamsul Shaari, Jesni, Bahari, Iskandar

    Published 2010
    “…We review the study on a two-way quantum key distribution protocol given imperfect settings through a simple analysis of a toy model and show that it can outperform a BB84 setup. We provide the sufficient condition for this as a ratio of optimal intensities for the protocols.…”
    Get full text
    Article
  9. 9

    Security proof of improved-SARG04 protocol using the same four qubit states by Ahmad Ghazali, Lizal Iswady, Abas, Ahmad Fauzi, Wan Adnan, Wan Azizun, Mokhtar, Makhfudzah, Mahdi, Mohd Adzir, Saripan, M. Iqbal

    Published 2010
    “…This protocol differs from BB84 and SARG04 protocol in the sifting process and provably outperforms those protocols against Photon Number Splitting attack at zero error, with secure transmission distance of 125 km of SSMF.…”
    Get full text
    Conference or Workshop Item
  10. 10

    An efficient modeling and simulation of quantum key distribution protocols using OptiSystem™ by Buhari, Abudhahir, Ahmad Zukarnain, Zuriati, K. Subramaniam, Shamala, Zainuddin, Hishamuddin, Saharudin, Suhairi

    Published 2012
    “…This simulation framework emphasize on experimental components of quantum key distribution. We simulate BB84 operation with several security attacks scenario and noise immune key distribution in this work. …”
    Get full text
    Conference or Workshop Item
  11. 11

    New estimates of single photon parameters for satellite-based QKD by Ali, Sellami, Wahiddin, Mohamed Ridza

    Published 2009
    “…A new decoy state method has been presented to tighten the lower bound of the key generation rate for BB84 using one decoy state and one signal state. …”
    Get full text
    Article
  12. 12

    Effectiveness of enhanced tight finite scheme in quantum key distribution protocol for network communication by Khalid, Roszelinda, Ahmad Zukarnain, Zuriati

    Published 2014
    “…In order to do so, in this research paper we are proposing a method that use the law of physics in communication in terms of cryptography and key distribution by applying quantum theorems and principle. Using BB84 protocol as a base in quantum key distribution together with the implementation of tight finite key that compress the Shannon entropy and Von Neumann theory. …”
    Get full text
    Conference or Workshop Item
  13. 13

    Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure by Khalid, Roszelinda, Ahmad Zulkarnain, Zuriati

    Published 2014
    “…Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. …”
    Get full text
    Article
  14. 14

    A novel error correction scheme in quantum key distribution (QKD) protocol by Lee, Siao Ping, Ng, Chee Kyun, Mokhtar, Makhfudzah

    Published 2015
    “…A new reconciliation protocol has been developed to enhance the error correcting capability in BB84 protocol. It is carried out in a simple structure which can correct up to double erroneous bits and detect four erroneous bits for each seven bits.…”
    Get full text
    Conference or Workshop Item
  15. 15

    Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique by Mohd Nasir, Rinie Narinie

    Published 2015
    “…In this study, the Scarani, Acin, Ribordy and Gisin 2004 (SARG04) protocol has been choosen because of its robustness against Photon Number Split- ting (PNS) attack compared to Bennet and Brassard 1984 (BB84) protocol. It is more likely that by improving secret key rate, the system can be more robust. …”
    Get full text
    Thesis
  16. 16

    Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure by Khalid, Roszelinda

    Published 2018
    “…Hence we are using quantum channel and also quantum key distribution (QKD) together with BB84 protocol replacing common channel to distribute the key. …”
    Get full text
    Thesis