A Simulative Comparison of BB84 Protocol with its Improved Version

Autores
Sharifi, Mohsen; Azizi, Hooshang
Año de publicación
2007
Idioma
inglés
Tipo de recurso
artículo
Estado
versión publicada
Descripción
Public key cryptosystems can well become void with the advent of incredibly high performance quantum computers. The underlying principles of these computers themselves, namely quantum mechanics, provide the solution to the key distribution problem. This paper explains how cryptography will be benefited from quantum mechanics, through a short introduction to classical cryptography, and the general principles of quantum cryptography and the BB84 protocol for key distribution. Then we review a modification to the BB84 protocol that is logically claimed to increase its efficiency. We then validate this claim by presenting our simulation results for BB84 and its improved protocols and show that the efficiency of the improved protocol could be doubled without undermining the security level of BB84 protocol.
Facultad de Informática
Materia
Ciencias Informáticas
quantum key distribution
criptografía
Nivel de accesibilidad
acceso abierto
Condiciones de uso
http://creativecommons.org/licenses/by-nc/3.0/
Repositorio
SEDICI (UNLP)
Institución
Universidad Nacional de La Plata
OAI Identificador
oai:sedici.unlp.edu.ar:10915/9558

id SEDICI_6ce7fd76ed03ca445fc90950a858d251
oai_identifier_str oai:sedici.unlp.edu.ar:10915/9558
network_acronym_str SEDICI
repository_id_str 1329
network_name_str SEDICI (UNLP)
spelling A Simulative Comparison of BB84 Protocol with its Improved VersionSharifi, MohsenAzizi, HooshangCiencias Informáticasquantum key distributioncriptografíaPublic key cryptosystems can well become void with the advent of incredibly high performance quantum computers. The underlying principles of these computers themselves, namely quantum mechanics, provide the solution to the key distribution problem. This paper explains how cryptography will be benefited from quantum mechanics, through a short introduction to classical cryptography, and the general principles of quantum cryptography and the BB84 protocol for key distribution. Then we review a modification to the BB84 protocol that is logically claimed to increase its efficiency. We then validate this claim by presenting our simulation results for BB84 and its improved protocols and show that the efficiency of the improved protocol could be doubled without undermining the security level of BB84 protocol.Facultad de Informática2007-10info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionArticulohttp://purl.org/coar/resource_type/c_6501info:ar-repo/semantics/articuloapplication/pdf204-208http://sedici.unlp.edu.ar/handle/10915/9558enginfo:eu-repo/semantics/altIdentifier/url/http://journal.info.unlp.edu.ar/wp-content/uploads/JCST-Oct07-2.pdfinfo:eu-repo/semantics/altIdentifier/issn/1666-6038info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc/3.0/Creative Commons Attribution-NonCommercial 3.0 Unported (CC BY-NC 3.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-03T10:23:34Zoai:sedici.unlp.edu.ar:10915/9558Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-03 10:23:34.713SEDICI (UNLP) - Universidad Nacional de La Platafalse
dc.title.none.fl_str_mv A Simulative Comparison of BB84 Protocol with its Improved Version
title A Simulative Comparison of BB84 Protocol with its Improved Version
spellingShingle A Simulative Comparison of BB84 Protocol with its Improved Version
Sharifi, Mohsen
Ciencias Informáticas
quantum key distribution
criptografía
title_short A Simulative Comparison of BB84 Protocol with its Improved Version
title_full A Simulative Comparison of BB84 Protocol with its Improved Version
title_fullStr A Simulative Comparison of BB84 Protocol with its Improved Version
title_full_unstemmed A Simulative Comparison of BB84 Protocol with its Improved Version
title_sort A Simulative Comparison of BB84 Protocol with its Improved Version
dc.creator.none.fl_str_mv Sharifi, Mohsen
Azizi, Hooshang
author Sharifi, Mohsen
author_facet Sharifi, Mohsen
Azizi, Hooshang
author_role author
author2 Azizi, Hooshang
author2_role author
dc.subject.none.fl_str_mv Ciencias Informáticas
quantum key distribution
criptografía
topic Ciencias Informáticas
quantum key distribution
criptografía
dc.description.none.fl_txt_mv Public key cryptosystems can well become void with the advent of incredibly high performance quantum computers. The underlying principles of these computers themselves, namely quantum mechanics, provide the solution to the key distribution problem. This paper explains how cryptography will be benefited from quantum mechanics, through a short introduction to classical cryptography, and the general principles of quantum cryptography and the BB84 protocol for key distribution. Then we review a modification to the BB84 protocol that is logically claimed to increase its efficiency. We then validate this claim by presenting our simulation results for BB84 and its improved protocols and show that the efficiency of the improved protocol could be doubled without undermining the security level of BB84 protocol.
Facultad de Informática
description Public key cryptosystems can well become void with the advent of incredibly high performance quantum computers. The underlying principles of these computers themselves, namely quantum mechanics, provide the solution to the key distribution problem. This paper explains how cryptography will be benefited from quantum mechanics, through a short introduction to classical cryptography, and the general principles of quantum cryptography and the BB84 protocol for key distribution. Then we review a modification to the BB84 protocol that is logically claimed to increase its efficiency. We then validate this claim by presenting our simulation results for BB84 and its improved protocols and show that the efficiency of the improved protocol could be doubled without undermining the security level of BB84 protocol.
publishDate 2007
dc.date.none.fl_str_mv 2007-10
dc.type.none.fl_str_mv info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Articulo
http://purl.org/coar/resource_type/c_6501
info:ar-repo/semantics/articulo
format article
status_str publishedVersion
dc.identifier.none.fl_str_mv http://sedici.unlp.edu.ar/handle/10915/9558
url http://sedici.unlp.edu.ar/handle/10915/9558
dc.language.none.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv info:eu-repo/semantics/altIdentifier/url/http://journal.info.unlp.edu.ar/wp-content/uploads/JCST-Oct07-2.pdf
info:eu-repo/semantics/altIdentifier/issn/1666-6038
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
http://creativecommons.org/licenses/by-nc/3.0/
Creative Commons Attribution-NonCommercial 3.0 Unported (CC BY-NC 3.0)
eu_rights_str_mv openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc/3.0/
Creative Commons Attribution-NonCommercial 3.0 Unported (CC BY-NC 3.0)
dc.format.none.fl_str_mv application/pdf
204-208
dc.source.none.fl_str_mv reponame:SEDICI (UNLP)
instname:Universidad Nacional de La Plata
instacron:UNLP
reponame_str SEDICI (UNLP)
collection SEDICI (UNLP)
instname_str Universidad Nacional de La Plata
instacron_str UNLP
institution UNLP
repository.name.fl_str_mv SEDICI (UNLP) - Universidad Nacional de La Plata
repository.mail.fl_str_mv alira@sedici.unlp.edu.ar
_version_ 1842260060866084864
score 13.13397