{"title":"具有噪声信道的量子密钥分配仿真","authors":"A. Pereszlényi","doi":"10.1109/CONTEL.2005.185853","DOIUrl":null,"url":null,"abstract":"In this paper secure schemes for cryptographic key distribution - called quantum key distribution protocols - are investigated by means of computer simulation. For this, a general purpose quantum circuit designer and simulator program was developed and used. To be more realistic the protocols were ran on different noisy quantum channels. The aim is to determine the grade of security of the protocols in function of the channel parameters they are using; and also to propose a method for selecting the best protocol for a given channel.","PeriodicalId":265923,"journal":{"name":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Simulation of quantum key distribution with noisy channels\",\"authors\":\"A. Pereszlényi\",\"doi\":\"10.1109/CONTEL.2005.185853\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper secure schemes for cryptographic key distribution - called quantum key distribution protocols - are investigated by means of computer simulation. For this, a general purpose quantum circuit designer and simulator program was developed and used. To be more realistic the protocols were ran on different noisy quantum channels. The aim is to determine the grade of security of the protocols in function of the channel parameters they are using; and also to propose a method for selecting the best protocol for a given channel.\",\"PeriodicalId\":265923,\"journal\":{\"name\":\"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-06-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONTEL.2005.185853\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONTEL.2005.185853","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Simulation of quantum key distribution with noisy channels
In this paper secure schemes for cryptographic key distribution - called quantum key distribution protocols - are investigated by means of computer simulation. For this, a general purpose quantum circuit designer and simulator program was developed and used. To be more realistic the protocols were ran on different noisy quantum channels. The aim is to determine the grade of security of the protocols in function of the channel parameters they are using; and also to propose a method for selecting the best protocol for a given channel.