2022
DOI: 10.3390/s22166284
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python3

Abstract: Autonomous “Things” is becoming the future trend as the role, and responsibility of IoT keep diversifying. Its applicability and deployment need to re-stand technological advancement. The versatile security interaction between IoTs in human-to-machine and machine-to-machine must also endure mathematical and computational cryptographic attack intricacies. Quantum cryptography uses the laws of quantum mechanics to generate a secure key by manipulating light properties for secure end-to-end communication. We pres… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 56 publications
0
8
0
Order By: Relevance
“…The first quantum key distribution (QKD) protocol, known as the BB84 protocol [1], was proposed by Bennett and Brassard in 1984. The security of this protocol relies on the Heisenberg uncertainty principle and the nocloning principle.…”
Section: Quantum Key Distribution Technologymentioning
confidence: 99%
See 1 more Smart Citation
“…The first quantum key distribution (QKD) protocol, known as the BB84 protocol [1], was proposed by Bennett and Brassard in 1984. The security of this protocol relies on the Heisenberg uncertainty principle and the nocloning principle.…”
Section: Quantum Key Distribution Technologymentioning
confidence: 99%
“…The link with the highest contribution rate is given priority, which corresponds to the link with the greatest increase in remaining key quantity after a key exchange, ensuring a balanced key quantity in each link. The contribution rate of a node to a link can be represented as Equation (1) shows:…”
Section: Link Cost Functionmentioning
confidence: 99%
“…To secure the software, web application, network, etc., several protocols are created sequentially with the same or different mechanism against the well-known quantum attack. In QKD depends on three algorithms BB84, B92, and EPR [18]. Quantum cryptography is guaranteed by the law of physics demonstrated by the non-cloning theory that supports the secure key unconditionally and detects eavesdropping on the quantum-based communication channel.…”
Section: B Alternativesmentioning
confidence: 99%
“…Quantum cryptography is based on the use of different quantum features to guarantee the security of information against attacks. Based on established security protocols [5], one of the best known is the BB84 protocol [6]. It was the first used for Quantum Key Distribution (QKD) [6,7].…”
Section: Introductionmentioning
confidence: 99%