A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping
[article]
2020
IACR Cryptology ePrint Archive
In this article we present the BB84 quantum key distribution scheme from two perspectives. First, we provide a theoretical discussion of the steps Alice and Bob take to reach a shared secret using this protocol, while an eavesdropper Eve is either involved or not. Then, we offer and discuss two distinct implementations that simulate BB84 using IBM's Qiskit framework, the first being an exercise solved during the "IBM Quantum Challenge" event in early May 2020, while the other was developed
dblp:journals/iacr/MinaS20
fatcat:ugj4yodkifhd5joantyo33uzuy