arXiv Analytics

Sign in

arXiv:2406.09091 [quant-ph]AbstractReferencesReviewsResources

Simulations of distributed-phase-reference quantum key distribution protocols

Venkat Abhignan, Abhishek Jamunkar, Gokul Nair, Mohit Mittal, Megha Shrivastava

Published 2024-06-13Version 1

Quantum technology can enable secure communication for cryptography purposes using quantum key distribution. Quantum key distribution protocols provide a secret key between two users with security guaranteed by the laws of quantum mechanics. To define the proper implementation of a quantum key distribution system using a particular cryptography protocol, it is crucial to critically and meticulously assess the device's performance due to technological limitations in the components used. We perform simulations on the ANSYS Interconnect platform to characterise the practical implementation of these devices using distributed-phase-reference protocols differential-phase-shift and coherent-one-way quantum key distribution. Further, we briefly describe and simulate some possible eavesdropping attempts, backflash attack, trojan-horse attack and detector-blinding attack exploiting the device imperfections.

Related articles: Most relevant | Search more
arXiv:1704.08169 [quant-ph] (Published 2017-04-26)
Noisy entanglement-assisted classical capacity as a security framework for two-way quantum key distribution protocols
arXiv:1207.5544 [quant-ph] (Published 2012-07-23)
Security of distributed-phase-reference quantum key distribution
arXiv:2111.04351 [quant-ph] (Published 2021-11-08)
Receiver-Device-Independent Quantum Key Distribution Protocols