Secure Quantum Communication & Quantum Key Distribution 101 - Dr. Urbasi

127 Aufrufe
Published
As a community, QuantumComputingIndia is committed to learning through theory and practise and one such enabler is our #FaciltatorSeries where we invite exceptional academicians and Practitioners to share their knowledge with the community. As a part of this ongoing series we had Dr. Urbasi with us last saturday and this is quick log of the knowledge shared by Dr. Urbasi around Qauntum Communications and the state of such research initiatives in India.


The different ways in which quantum key distribution can be done
1.Without using Entanglement example:bb84 protocol
In this protocol we do not use entanglement but we use the uncertainty principle or the no cloning theorem for non orthogonal states to protect the information.
2.With Entanglement example:EPR protocol


The critical elements to be developed in QKD:
- Quantum source
- QKD simulations
- QKD protocol
- Sifting
- Privacy amplification
- Error correction
- Secure key.
Similarly there is the b92 protocol which is also a prepare and measure protocol so b92 is essentially a modified version of bb84 the only difference here is that instead of using four bases we use two bases.

Curious about QuantumComputing ? Join India's fastest growing community - https://quantumcomputingindia.com/

Register for our next #FaciltatorSeries session at :
https://quantumcomputingindia.com/cryptography-august

#QKD #QuantumCryptography #QuantumComputingIndia
Kategorien
Corona Virus aktuelle Videos
Kommentare deaktiviert.