{"title":"Simulation of quantum key distribution with noisy channels","authors":"A. Pereszlényi","doi":"10.1109/CONTEL.2005.185853","DOIUrl":null,"url":null,"abstract":"In this paper secure schemes for cryptographic key distribution - called quantum key distribution protocols - are investigated by means of computer simulation. For this, a general purpose quantum circuit designer and simulator program was developed and used. To be more realistic the protocols were ran on different noisy quantum channels. The aim is to determine the grade of security of the protocols in function of the channel parameters they are using; and also to propose a method for selecting the best protocol for a given channel.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONTEL.2005.185853","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
In this paper secure schemes for cryptographic key distribution - called quantum key distribution protocols - are investigated by means of computer simulation. For this, a general purpose quantum circuit designer and simulator program was developed and used. To be more realistic the protocols were ran on different noisy quantum channels. The aim is to determine the grade of security of the protocols in function of the channel parameters they are using; and also to propose a method for selecting the best protocol for a given channel.