From the course: Quantum Networking by Pearson
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Less common QKD protocols
From the course: Quantum Networking by Pearson
Less common QKD protocols
In Lesson 4, we went over some very common quantum key distribution protocols. Well, in this lesson, I'm going to introduce you to some less common ones. Given they're less common, it's less critical that you have an in-depth understanding of them, but you should at least be aware of what's out there and what's available. So let's jump right in. T12 was designed by Toshiba Research in Europe. It's a variant of BB84, which is something you've heard quite a bit. It's designed to be provably secure in the finite size regime, and also to be more practical for real-world implementations compared to some idealized protocols. It, as with some other protocols we've seen, introduces decoy states. It also has optimized parameter estimation. This makes it really resilient to known attacks, like the photon number splitting attack and the detector side channel attack. Now Toshiba actually markets products using this. Something we said in the very first lesson is there are real world quantum key…
Contents
-
-
Quantum networking: Introduction2m 28s
-
Defining quantum networks11m 23s
-
(Locked)
The structure of quantum networks4m 39s
-
(Locked)
Examples of quantum networks18m 56s
-
(Locked)
Common quantum key distribution (QKD) protocols14m 24s
-
(Locked)
Less common QKD protocols5m 25s
-
(Locked)
Comparing QKD protocols3m 34s
-
(Locked)
QKD variations12m 59s
-
(Locked)
Quantum error correction6m 10s
-
(Locked)
Quantum information theory17m 26s
-