AG-2024.06-1850·quant-ph
Simulations of distributed-phase-reference quantum key distribution protocols
Authors
- Venkat Abhignan
- Abhishek Jamunkar
- Gokul Nair
- Mohit Mittal
- Megha Shrivastava
Abstract
Quantum technology can enable secure communication for cryptography purposes using quantum key distribution. Quantum key distribution protocols provide a secret key between two users with security guaranteed by the laws of quantum mechanics. To define the proper implementation of a quantum key distribution system using a particular cryptography protocol, it is crucial to critically and meticulously assess the device's performance due to technological limitations in the components used. We perform simulations on the ANSYS Interconnect platform to characterise the practical implementation of these devices using distributed-phase-reference protocols differential-phase-shift and coherent-one-way quantum key distribution. Further, we briefly describe and simulate some possible eavesdropping attempts, backflash attack, trojan-horse attack and detector-blinding attack exploiting the device imperfections.
Submitted
13 June 20241 year ago
Version
v1
License
CC-BY-4.0
DOI
10.48550/arXiv.2406.09091
Chat with this PDF
Ask questions, probe assumptions, request a plain-English summary. Answers cite sections from the preprint itself.
Community
Questions and answers about this paper from other readers. No formal peer review — just a place to think out loud.