RESEARCH OF QUANTUM KEY DISTRIBUTION PROTOCOLS: BB84, B92, E91
Аннотация
Ключевые слова
Полный текст:
PDF (English)Литература
Kronberg D., Ozhigov Y., Chernyavskyi A. (2006) Kvantovaya kriptographiya [Quantum Cryptography].
MSU named after M.V.Lomonosov - Moscow, p. 23-40.
Vyalyy M. (2011). Kvantovyye algoritmy: vozmozhnosti i ogranicheniya [Quantum Algorithms:
Possibilities and Limitations]. St. Petersburg. https://storage.yandexcloud.net/lms-vault/private/2/
courses/2011-spring/spb-quantumalgorithms/materials/20110403_quantum_algorithms_vyali_
lecture_notes.pdf
Postulates of quantum theory. VSU, (2012). http://www.rec.vsu.ru/rus/ecourse/quantcomp/sem2.
Bennett, C.H., Bessette, F., Brassard, G. et al. (1992). Experimental quantum cryptography. J. Cryptology, 5, 3–28. https://doi.org/10.1007/BF00191318
Gisin, N., Ribordy, G., Tittel, W., Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics,
(1), 145-195. https://doi.org/10.1103/RevModPhys.74.145
Baumeyster D. (2002) Fizika kvantovoy informatsii [Physics of quantum information]. Postmarket
Moscow. -376 p.
Bechmann-Pasquinucci, H. (2006). Eavesdropping without quantum memory. Physical Review A, 73,
-305. Retrieved from The Heat Is Online website: https://doi.org/10.1103/PhysRevA.73.044305
Warke A., Behera B. K., Panigrahi P. K. Experimental realization of three quantum key distribution protocols //Quantum Information Processing. – 2020. – Т. 19. – №. 11. – С. 1-15. https://doi.
org/10.1007/s11128-020-02914-z
Shicheng Zhao, Wendong Li, Yuan Shen, YongHe Yu, XinHong Han, Hao Zeng, Maoqi Cai, Tian Qian,
Shuo Wang, Zhaoming Wang, Ya Xiao, and Yongjian Gu. (2019). «Experimental investigation of quantum key distribution over a water channel,» Appl. Opt., 58, 3902-3907. https://doi.org/10.1364/
AO.58.003902
Chi Zhang, Xiao-Long Hu, Cong Jiang, Jiu-Peng Chen, Yang Liu, Weijun Zhang, Zong-Wen Yu, Hao
Li, Lixing You, Zhen Wang, Xiang-Bin Wang, Qiang Zhang, and Jian-Wei Pan. (13 May 2022).
Experimental Side-Channel-Secure Quantum Key Distribution. Phys. Rev. Lett., 128, 190503
Bennet C. (1992) Quantum Cryptography using any Two Nonorthogonal States. Phys.Rev.Lett., 68,
https://doi.org/10.1103/PhysRevLett.68.3121
IBM Quantum Composer and the IBM Quantum Lab. https://quantum-computing.ibm.com/
Dhoha A. L. M. et al. Quantum cryptography on IBM QX. 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). – IEEE, 2019. – С. 1-6. https://doi.org/10.1109/
cais.2019.8769567
Helstrom, C.W. (1969). Quantum detection and estimation theory. J Stat Phys 1, 231–252. https://
doi.org/10.1007/BF01007479
Nurhadi A. I., Syambas N. R. Quantum key distribution (QKD) protocols: A survey. 2018 4th International Conference on Wireless and Telematics (ICWT). – IEEE, 2018. – С. 1-5. https://doi.org/10.1109/
icwt.2018.8527822
DOI: http://dx.doi.org/10.37943/10.37943%2FQRKJ7456
Ссылки
- Ссылки не определены.
(P): 2707-9031
(E): 2707-904X
Articles are open access under the Creative Commons License
Нур-Султан
Бизнес-центр EXPO, блок C.1.
Казахстан, 010000