2019 2nd International Conference on Computer Applications &Amp; Information Security (ICCAIS) 2019
DOI: 10.1109/cais.2019.8769567
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Cryptography on IBM QX

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…The strong key distribution method is the only solution for delivering security in BAN. Doha AL-Mubayedh et al [ 9 ] defines a quantum key distribution protocol BB84 and provides a practical implementation of it on IBM QX software. This proposed scheme provided a statistical analysis of detecting/not detecting third-party eavesdropping.…”
Section: Related Workmentioning
confidence: 99%
“…The strong key distribution method is the only solution for delivering security in BAN. Doha AL-Mubayedh et al [ 9 ] defines a quantum key distribution protocol BB84 and provides a practical implementation of it on IBM QX software. This proposed scheme provided a statistical analysis of detecting/not detecting third-party eavesdropping.…”
Section: Related Workmentioning
confidence: 99%
“…Grounding these theoretical discussions into practical validations, empirical studies implement and scrutinize cryptographic protocols, exemplified by the BB84 quantum key distribution protocol [11]. These experiments bridge theoretical expectations with practical implementations, encompassing statistical analyses while illuminating the tangible realization of qubits, quantum gates, and their implications in secure communication.…”
Section: Related Literaturementioning
confidence: 99%
“…In a paper about quantum key distribution by Al-Mubayedh [1] he had done research about quantum cryptography on IBM QX .The paper explained the quantum key distribution algorithm and run it on IBM QX .In another paper on quantum cryptography done by S. Mitra, et al, [2] had done a comparison between the classical computation and the quantum computation. The comparison proved that most of the algorithms that is used by public key encryption and other encryption are not secure and can be broken by quantum computations.…”
Section: Literature Reviewmentioning
confidence: 99%