Showing 1 - 20 results of 1,613 for search '"BB84"', query time: 0.63s Refine Results
  1. 1
  2. 2

    Deterministic Secure Quantum Communication on the BB84 System by Youn-Chang Jeong, Se-Wan Ji, Changho Hong, Hee Su Park, Jingak Jang

    Published 2020-11-01
    “…In this paper, we propose a deterministic secure quantum communication (DSQC) protocol based on the BB84 system. We developed this protocol to include quantum entity authentication in the DSQC procedure. …”
    Get full text
    Article
  3. 3
  4. 4

    Implemetation of BB84 quantum key distribution protocol’s with attacks. by Muhammad, Nur Atiqah, Ahmad Zulkarnain, Zuriati

    Published 2009
    “…This paper discusses the implementation of QKD protocol (BB84 protocol), which is widely used today. The implementation simulates the communication of two parties who wish to share a secret key with the existing of eavesdropper. …”
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Cloud Data Security through BB84 Protocol and Genetic Algorithm by Jaydip Kumar, Vipin Saxena

    Published 2022-12-01
    Subjects: “…Attribute based Encryption, BB84 Protocol Cloud, Data Security, Geneticncryption/Decryption, Quantum Key Distribution…”
    Get full text
    Article
  8. 8
  9. 9

    Modified BB84 quantum key distribution protocol robust to source imperfections by Margarida Pereira, Guillermo Currás-Lorenzo, Álvaro Navarrete, Akihiro Mizutani, Go Kato, Marcos Curty, Kiyoshi Tamaki

    Published 2023-04-01
    “…The Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key distribution (QKD) scheme. …”
    Get full text
    Article
  10. 10

    RESEARCH OF QUANTUM KEY DISTRIBUTION PROTOCOLS: BB84, B92, E91 by Y. Begimbayeva, T. Zhaxalykov

    Published 2022-06-01
    “…The article examines the points of interest and impediments of the BB84, B92, and E91 quantum key distribution conventions.…”
    Get full text
    Article
  11. 11

    Modelling efficient BB84 with applications for medium-range, terrestrial free-space QKD by Thomas Brougham, Daniel K L Oi

    Published 2022-01-01
    “…Here, we investigate these issues for efficient BB84 using a weak coherent pulse-decoy state protocol. …”
    Get full text
    Article
  12. 12
  13. 13

    Dispersion Supported BB84 Quantum Key Distribution Using Phase Modulated Light by J. Mora, A. Ruiz-Alba, W. Amaya, J. Capmany

    Published 2011-01-01
    “…Thus, we refer to this system as dispersion supported or as the DS BB84 PM-PM configuration.…”
    Get full text
    Article
  14. 14
  15. 15

    Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3 by Akwasi Adu-Kyere, Ethiopia Nigussie, Jouni Isoaho

    Published 2022-08-01
    “…The model relies on the BB84 quantum key distribution (QKD) protocol with two scenarios, without and with the presence of an eavesdropper via the interception-resend attack model from a theoretical, methodological, and practical perspective. …”
    Get full text
    Article
  16. 16

    Simulação do protocolo BB84 de criptografia quântica utilizando um feixe laser intenso by A.L.P. Camargo, L.O. Pereira, W.F. Balthazar, J.A.O. Huguenin

    “…Neste trabalho apresentamos um experimento muito simples explorando a polarização de um feixe laser intenso para simular a distribuição de uma chave criptográfica através do protocolo BB84 de criptografia quântica. Nossa proposta está baseada na analogia entre graus de liberdade de um feixe laser com estados quânticos da luz, muito discutida atualmente. …”
    Get full text
    Article
  17. 17
  18. 18

    Fiber and free-space practical decoy state QKD for both BB84 and SARG04 protocols by Ali, Sellami, Wahiddin, Mohamed Ridza

    Published 2010
    “…Fiber and free-space practical decoy state quantum key distribution has been simulated for both BB84 and SARG04 protocols. The numerical simulation has shown that the fiber based QKD and free space QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04…”
    Get full text
    Article
  19. 19

    Improving key rates of the unbalanced phase-encoded BB84 protocol using the flag-state squashing model by Nicky Kai Hong Li, Norbert Lütkenhaus

    Published 2020-11-01
    “…All phase-encoded BB84 implementations have signal states with unbalanced amplitudes in practice. …”
    Get full text
    Article
  20. 20