2015 International Conference on Communication, Information &Amp; Computing Technology (ICCICT) 2015
DOI: 10.1109/iccict.2015.7045661
|View full text |Cite
|
Sign up to set email alerts
|

On the performance of quantum cryptographic protocols SARG04 and KMB09

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 16 publications
1
6
0
Order By: Relevance
“…Similar findings were reported by Mailloux et al (2015) who concluded that such technologies have resulted in a diverse trade space of design competition and choice of implementation which included many encoding schemes and quantum exchange protocols. The study results were also comparable with the findings of Lopes and Sarwade (2015) who suggested that incorporation of QKD protocol with wireless network improved the system security.…”
Section: Reconciliation-error Correction Cascadesupporting
confidence: 87%
See 1 more Smart Citation
“…Similar findings were reported by Mailloux et al (2015) who concluded that such technologies have resulted in a diverse trade space of design competition and choice of implementation which included many encoding schemes and quantum exchange protocols. The study results were also comparable with the findings of Lopes and Sarwade (2015) who suggested that incorporation of QKD protocol with wireless network improved the system security.…”
Section: Reconciliation-error Correction Cascadesupporting
confidence: 87%
“…Also, efforts were made to blend the security proofs to prove the security of practical implementation prototypes (Wang, 2011). Recently it was proved that QKD protocols can be incorporated with wireless networks to improve their security (Anghel and Coman, 2009;Lopes and Sarwade, 2015).…”
Section: Introductionmentioning
confidence: 99%
“…The introduction of ITER and QBER helps in analyzing the performance of the protocol. It has been noticed that the Index Transmission Error Rate shoots up for the photon states in higher dimension very significantly and therefore permits higher tolerance towards noise in the transmission line, which in turn increases the possible distance of QKD [54]. All vectors of one basis are used in this protocol to encode the bit differentiating it from the SARG04 and BB84.…”
Section: Prepare and Measure Protocolsmentioning
confidence: 99%
“…Numerous researchers have evolved the BB84 protocol into subsequent quantum protocols. A few examples include BB84 [7], Decoy State [8,SARG04 [9], Six-State [10], E91 [11], and KMB09 [12]. The researchers came up with these protocols, and they all adhered to the BB84 protocol.…”
Section: Introductionmentioning
confidence: 99%