Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Quantum Cryptography Protocols

8

Flashcards

0/8

Still learning
StarStarStarStar

Quantum Coin Flipping

StarStarStarStar

Quantum Coin Flipping is a protocol aimed at achieving a fair coin toss over a distance without the players physically meeting. It uses superposition states, and measurements are used to ascertain the fairness of the toss outcomes.

StarStarStarStar

E91

StarStarStarStar

The E91 protocol is based on quantum entanglement and uses entangled photon pairs to establish a secure key. It exploits the principles of quantum correlations and tests for the presence of eavesdroppers through violation of Bell's inequalities.

StarStarStarStar

Quantum Secret Sharing (QSS)

StarStarStarStar

Quantum Secret Sharing is a protocol to split a secret message into parts that are distributed to participants, where the original message can only be reconstructed with a subset of those parts. It employs quantum mechanics principles like superposition and entanglement to secure the distribution.

StarStarStarStar

Continuous-Variable Quantum Key Distribution (CV-QKD)

StarStarStarStar

CV-QKD uses continuous variables of quantum states (like position and momentum correlations of light) to perform key distribution. It applies the uncertainty principle to continuous variables to ensure security.

StarStarStarStar

QKD B92

StarStarStarStar

The B92 protocol is a simplified version of the BB84, requiring only two non-orthogonal quantum states to distribute a secure key. It makes use of the fact that non-orthogonal states cannot be reliably distinguished, according to the uncertainty principle.

StarStarStarStar

Quantum Key Recycling

StarStarStarStar

Quantum Key Recycling is a protocol allowing for the reuse of a quantum key after successful message authentication and secrecy have been confirmed. It relies on principles of uncertainty and quantum error detection.

StarStarStarStar

Device-Independent QKD (DI-QKD)

StarStarStarStar

DI-QKD is a protocol that aims to ensure the security of quantum key distribution even with untrusted devices, leveraging properties of quantum entanglement and non-locality as verified through tests of Bell inequalities.

StarStarStarStar

BB84

StarStarStarStar

BB84 is a quantum key distribution protocol that uses the no-cloning theorem and polarization states of photons to securely distribute keys. It employs two sets of orthogonal bases (rectilinear and diagonal) where the sender (Alice) randomly chooses bases to encode bits and the receiver (Bob) randomly chooses bases to measure incoming photons.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.