Article
Version 1
Preserved in Portico This version is not peer-reviewed
A Comparison of Several Implementations of B92 Quantum Key Distribution Protocol
Version 1
: Received: 20 February 2021 / Approved: 22 February 2021 / Online: 22 February 2021 (15:27:24 CET)
How to cite: Anghel, C. A Comparison of Several Implementations of B92 Quantum Key Distribution Protocol. Preprints 2021, 2021020486. https://doi.org/10.20944/preprints202102.0486.v1 Anghel, C. A Comparison of Several Implementations of B92 Quantum Key Distribution Protocol. Preprints 2021, 2021020486. https://doi.org/10.20944/preprints202102.0486.v1
Abstract
This paper presents the development, comparison and analysis of several implementations of the B92 Quantum Key Distribution (QKD) protocol. In order to achieve this objective a prototype which consists of traditional (non-quantum) simulators was created, one for B92 protocol, one for B92 protocol with eavesdropper and one for B92 protocol with Quantum Bit Travel Time (QBTT) eavesdropper detection method. The principles of quantum mechanics were studied, as a foundation of quantum cryptography, for the realization of simulation programs that were written in C ++, focusing mainly on the B92 protocol and QBTT eavesdropper detection method. We compared the Quantum Bit Error Rate (QBER) for implementation of B92 protocol without eavesdropper, B92 protocol with eavesdropper and B92 protocol with QBTT eavesdropper detection method and found that QBTT eavesdropper detection method significantly reduces the QBER from the final key.
Keywords
quantum cryptography; quantum physics; quantum key distribution; qkd; quantum protocol; B92 protocol; QBTT eavesdropper detection method; qbit
Subject
Computer Science and Mathematics, Algebra and Number Theory
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment