2020 17th International Bhurban Conference on Applied Sciences and Technology (IBCAST) 2020
DOI: 10.1109/ibcast47879.2020.9044522
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of QKD Protocols: Simulation & Comparison

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…As a result, the uncertainty accuracy in QKD research simulations ranges from 90 to 99 percent. However, in this work, even though the error threshold with Eve's presence exceeds the threshold, 0.11 was chosen as the error threshold, consistent with the theory and literature [7]. They both do so without revealing any important information.…”
Section: Communication Phase Resultsmentioning
confidence: 87%
See 2 more Smart Citations
“…As a result, the uncertainty accuracy in QKD research simulations ranges from 90 to 99 percent. However, in this work, even though the error threshold with Eve's presence exceeds the threshold, 0.11 was chosen as the error threshold, consistent with the theory and literature [7]. They both do so without revealing any important information.…”
Section: Communication Phase Resultsmentioning
confidence: 87%
“…Shajahan, Rimitha, Nair, and Suchithra S. [59] explained how a networking scenario could exploit pure laws in physics through QKD simulation inside a classical communication channel. Khan et al [7] presented an indepth security analysis on QKD protocols encompassing theoretical assertions to practical implementation factors. Anuj Sethia and Anindita Banerjee [60] simulated a practical model implementation of differential phase shift (DPS) QKD with a toolkit based on Simulink and MATLAB.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Quantum key distribution (QKD) is a procedure which allows the growth of keys between remote parties with guaranteed security. There are many different protocols, 1 including both discrete variable (polarisation encoded, 2 phase encoded 3,4 and entanglement-based [5][6][7] ) and continuous variable 8 examples. All discrete variable protocols encode individual bits of key information in the properties of single photons.…”
Section: Introductionmentioning
confidence: 99%