homescontents
deneme bonusu veren siteler deneme bonusu veren siteler deneme bonusu veren siteler deneme bonusu veren siteler deneme bonusu veren siteler
film izle
RESEARCH OF QUANTUM KEY DISTRIBUTION PROTOCOLS: BB84, B92, E91 | Begimbayeva | Scientific Journal of Astana IT University

RESEARCH OF QUANTUM KEY DISTRIBUTION PROTOCOLS: BB84, B92, E91

Y. Begimbayeva, T. Zhaxalykov

Аннотация


The proposed article is devoted to the investigation of quantum key distribution protocols. The idiosyncrasy of this theme lies within the truth that present day strategies of key distribution, which utilize classical computing at their center, have critical downsides, in contrast to quantum key distribution. This issue concerns all sorts of calculations and frameworks for scrambling mystery data, both symmetric encryption with a private key and deviated encryption with an open key. A case is that in a communication channel ensured by quantum key distribution, it is conceivable to distinguish an interceptor between two legitimate organize substances utilizing the standards laid down in quantum material science at the starting of the final century. Standards and hypotheses such as the Heisenberg guideline, quantum trap, superposition, quantum teleportation, and the no-cloning hypothesis. The field of ponder of this theme may be a promising and quickly creating zone within the field of data security and data security. There are as of now made commercial items with the usage of a few of the quantum key dispersion conventions. Numerous of the made items are utilized in different circles of human movement. The significance of applying quantum key distribution conventions beneath perfect conditions without taking into consideration blunders within the frame of quantum clamor is analyzed. The usage of three quantum key distribution conventions is illustrated, as well as the comes about of the appearance of keys and the likelihood of event of each of them. The purpose of the article is pointed at analyzing and investigating quantum key distribution conventions. The article examines the points of interest and impediments of the BB84, B92, and E91 quantum key distribution conventions.

Ключевые слова


quantum cryptography, quantum key distribution, Heisenberg’s uncertainty principle, superposition, quantum gate, quantum entanglement.

Полный текст:

PDF (English)

Литература


Kronberg D., Ozhigov Y., Chernyavskyi A. (2006) Kvantovaya kriptographiya [Quantum Cryptography].

MSU named after M.V.Lomonosov - Moscow, p. 23-40.

Vyalyy M. (2011). Kvantovyye algoritmy: vozmozhnosti i ogranicheniya [Quantum Algorithms:

Possibilities and Limitations]. St. Petersburg. https://storage.yandexcloud.net/lms-vault/private/2/

courses/2011-spring/spb-quantumalgorithms/materials/20110403_quantum_algorithms_vyali_

lecture_notes.pdf

Postulates of quantum theory. VSU, (2012). http://www.rec.vsu.ru/rus/ecourse/quantcomp/sem2.

pdf

Bennett, C.H., Bessette, F., Brassard, G. et al. (1992). Experimental quantum cryptography. J. Cryptology, 5, 3–28. https://doi.org/10.1007/BF00191318

Gisin, N., Ribordy, G., Tittel, W., Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics,

(1), 145-195. https://doi.org/10.1103/RevModPhys.74.145

Baumeyster D. (2002) Fizika kvantovoy informatsii [Physics of quantum information]. Postmarket

Moscow. -376 p.

Bechmann-Pasquinucci, H. (2006). Eavesdropping without quantum memory. Physical Review A, 73,

-305. Retrieved from The Heat Is Online website: https://doi.org/10.1103/PhysRevA.73.044305

Warke A., Behera B. K., Panigrahi P. K. Experimental realization of three quantum key distribution protocols //Quantum Information Processing. – 2020. – Т. 19. – №. 11. – С. 1-15. https://doi.

org/10.1007/s11128-020-02914-z

Shicheng Zhao, Wendong Li, Yuan Shen, YongHe Yu, XinHong Han, Hao Zeng, Maoqi Cai, Tian Qian,

Shuo Wang, Zhaoming Wang, Ya Xiao, and Yongjian Gu. (2019). «Experimental investigation of quantum key distribution over a water channel,» Appl. Opt., 58, 3902-3907. https://doi.org/10.1364/

AO.58.003902

Chi Zhang, Xiao-Long Hu, Cong Jiang, Jiu-Peng Chen, Yang Liu, Weijun Zhang, Zong-Wen Yu, Hao

Li, Lixing You, Zhen Wang, Xiang-Bin Wang, Qiang Zhang, and Jian-Wei Pan. (13 May 2022).

Experimental Side-Channel-Secure Quantum Key Distribution. Phys. Rev. Lett., 128, 190503

Bennet C. (1992) Quantum Cryptography using any Two Nonorthogonal States. Phys.Rev.Lett., 68,

https://doi.org/10.1103/PhysRevLett.68.3121

IBM Quantum Composer and the IBM Quantum Lab. https://quantum-computing.ibm.com/

Dhoha A. L. M. et al. Quantum cryptography on IBM QX. 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). – IEEE, 2019. – С. 1-6. https://doi.org/10.1109/

cais.2019.8769567

Helstrom, C.W. (1969). Quantum detection and estimation theory. J Stat Phys 1, 231–252. https://

doi.org/10.1007/BF01007479

Nurhadi A. I., Syambas N. R. Quantum key distribution (QKD) protocols: A survey. 2018 4th International Conference on Wireless and Telematics (ICWT). – IEEE, 2018. – С. 1-5. https://doi.org/10.1109/

icwt.2018.8527822




DOI: http://dx.doi.org/10.37943/10.37943%2FQRKJ7456

Ссылки

  • Ссылки не определены.


(P): 2707-9031
(E): 2707-904X

Articles are open access under the Creative Commons License  


Нур-Султан
Бизнес-центр EXPO, блок C.1.
Казахстан, 010000

sjaitu@astanait.edu.kz
https://ejournal.unperba.ac.id/pages/uploads/sv388/ https://ejournal.unperba.ac.id/pages/uploads/ladangtoto/ https://poltekkespangkalpinang.ac.id/public/assets/scatter-hitam/ https://poltekkespangkalpinang.ac.id/public/assets/blog/sv388/ https://poltekkespangkalpinang.ac.id/public/uploads/depo-5k/ https://smpn9prob.sch.id/content/luckybet89/