Since the 80 s when it was first proposed, Quantum Key Distribution (QKD) elicited great interest in the field of cryptography as a unique procedure for key generation that could in principle guarantee unconditionally secure communication “by the laws of Physics”. In the last fifteen years commercial solutions have started appearing on the market, showing that practical implementations of the protocol were not only possible but also competitive in terms of security and achievable secret-key rate. In this work we describe a simulation of the historical QKD protocol E91 on the IBM Quantum platform, making use of the qubit formalism to represent the quantum states received by two communicating nodes. Having implemented also the post-processing steps for the error correction and the privacy amplification, this model can represent a simple stand-alone tool to study the performance not only of one-to-one communication but of more complex systems that rely on QKD for security, one above all QKD networks.
Simulation of an entanglement-based quantum key distribution protocol
Mariani L.;Salatino L.;Attanasio C.;Pagano S.;Citro R.
2024
Abstract
Since the 80 s when it was first proposed, Quantum Key Distribution (QKD) elicited great interest in the field of cryptography as a unique procedure for key generation that could in principle guarantee unconditionally secure communication “by the laws of Physics”. In the last fifteen years commercial solutions have started appearing on the market, showing that practical implementations of the protocol were not only possible but also competitive in terms of security and achievable secret-key rate. In this work we describe a simulation of the historical QKD protocol E91 on the IBM Quantum platform, making use of the qubit formalism to represent the quantum states received by two communicating nodes. Having implemented also the post-processing steps for the error correction and the privacy amplification, this model can represent a simple stand-alone tool to study the performance not only of one-to-one communication but of more complex systems that rely on QKD for security, one above all QKD networks.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.