Eavesdropping detection in BB84 quantum key distribution protocols

C Lee, I Sohn, W Lee - IEEE Transactions on Network and …, 2022 - ieeexplore.ieee.org
The nature of quantum mechanics provides us with an opportunity to statistically detect
eavesdropping in quantum key distribution (QKD) protocols, which is unimaginable in …

Providing variable levels of security in quantum cryptography

A Parakh - Quantum Communications and Quantum Imaging …, 2018 - spiedigitallibrary.org
Quantum cryptography provides perfect secrecy if the key exchanged is used for one-time-
pad encryption. However, this requires very long keys which are not practical in most …

A quantum diffie-hellman protocol

P Subramaniam, A Parakh - International Journal of …, 2016 - inderscienceonline.com
In this paper, a quantum version of Diffie-Hellman key agreement protocol is developed
using the commutative rotation transformations. Qubits rotated by secret rotation angles and …

Using fewer qubits to correct errors in the three-stage QKD protocol

A Parakh - Quantum Information Science and Technology IV, 2018 - spiedigitallibrary.org
This paper discusses correcting small rotation errors in the three-stage quantum key
distribution (QKD) protocol using only two logical qubits thereby increasing communication …

Limits on detecting eavesdropper in qkd protocols

P Subramaniam, A Parakh - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Quantum key distribution (QKD) protocols form a natural choice for encryption in optical
networks. All the QKD protocols use errors caused due to random measurements by Eve to …

New protocol for quantum public key cryptography

A Parakh - 2015 IEEE International Conference on Advanced …, 2015 - ieeexplore.ieee.org
We present a quantum public key cryptographic protocol that allow Bob to send any arbitrary
qubit state to Alice, securely. The proposed protocol (quantum pad-lock protocol) uses …

Quantum teleportation for keyless cryptography

A Parakh - Quantum Information and Computation XIII, 2015 - spiedigitallibrary.org
This paper looks at using quantum teleportation for secure message exchange. Although the
proposed protocol has parallels with Ekert's protocol for key distribution, we look at the issue …

[图书][B] Simulation of Quantum Algorithms Over Distributed Network Systems

J Joel vanBrandwijk - 2016 - search.proquest.com
For students and researchers alike, the field of quantum computing is difficult to approach.
The nature of quantum computing runs counter to the intuitive framework applied to most …