Software implementation of Bechmann-Pasquinucci and Peres protocol for qutrits

Gabriela Mogos*

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

Abstract

The main goals of cryptography are for a sender and a receiver to be able to communicate in a way that is unintelligible to third parties, and for the authentication of messages to prove that they were not altered in transit. Both of these goals can be accomplished with provable security if sender and receiver are in possession of shared, the secret key. This paper presents a software-prototype of the Bechmann-Pasquinucci and Peres protocol for qutrits, on two cases: with and without cyber-attack (the Intercept-Resend attack). Presence of the enemy is determined by calculating the errors obtained at the end of transmission through quantum channel. The method Quantum Trit Error Rate (QTER) for detecting enemy can be applied to the majority key distribution systems, each system having its own acceptable error rate.

Original languageEnglish
Title of host publication2015 International Symposium on Networks, Computers and Communications, ISNCC 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467374675
DOIs
Publication statusPublished - 2 Sept 2015
Externally publishedYes
EventInternational Symposium on Networks, Computers and Communications, ISNCC 2015 - Yasmine Hammamet, Tunisia
Duration: 13 May 201515 May 2015

Publication series

Name2015 International Symposium on Networks, Computers and Communications, ISNCC 2015

Conference

ConferenceInternational Symposium on Networks, Computers and Communications, ISNCC 2015
Country/TerritoryTunisia
CityYasmine Hammamet
Period13/05/1515/05/15

Keywords

  • Qutrits
  • quantum computing
  • quantum cryptography

Cite this