Modeling of quantum channel parameters impact on information exchange security
Title | Modeling of quantum channel parameters impact on information exchange security |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Arshinov, N. A., Butakova, N. G. |
Conference Name | 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) |
Date Published | Feb. 2018 |
Publisher | IEEE |
ISBN Number | 978-1-5386-4340-2 |
Keywords | adversary, Adversary Models, attack on the protocol, Attenuation, authorisation, C++ language, cryptanalysis, cryptographic security, cryptography, Human Behavior, information exchange security, Information security, Metrics, Photonics, photons, Polarization, Protocols, pubcrawl, Qt Creator C++ program package, quantum channel imperfections, quantum channel parameters impact modeling, quantum communication channel, quantum computer, quantum computing, quantum computing security, quantum information exchange computer emulator, Quantum Key Distribution, Resiliency, Scalability, software packages, unauthorized access |
Abstract | Quantum information exchange computer emulator is presented, which takes into consideration imperfections of real quantum channel such as noise and attenuation resulting in the necessity to increase number of photons in the impulse. The Qt Creator C++ program package provides evaluation of the ability to detect unauthorized access as well as an amount of information intercepted by intruder. |
URL | https://ieeexplore.ieee.org/document/8317373 |
DOI | 10.1109/EIConRus.2018.8317373 |
Citation Key | arshinov_modeling_2018 |
- Polarization
- unauthorized access
- software packages
- Scalability
- Resiliency
- Quantum Key Distribution
- quantum information exchange computer emulator
- quantum computing security
- quantum computing
- quantum computer
- quantum communication channel
- quantum channel parameters impact modeling
- quantum channel imperfections
- Qt Creator C++ program package
- pubcrawl
- Protocols
- adversary
- photons
- Photonics
- Metrics
- information security
- information exchange security
- Human behavior
- Cryptography
- cryptographic security
- cryptanalysis
- C++ language
- authorisation
- attenuation
- attack on the protocol
- Adversary Models