research

Event-by-event Simulation of Quantum Cryptography Protocols

Abstract

We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper

    Similar works

    Full text

    thumbnail-image

    Available Versions

    Last time updated on 05/06/2019
    Last time updated on 15/10/2017