From the course: Quantum Networking by Pearson

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Less common QKD protocols

Less common QKD protocols

In Lesson 4, we went over some very common quantum key distribution protocols. Well, in this lesson, I'm going to introduce you to some less common ones. Given they're less common, it's less critical that you have an in-depth understanding of them, but you should at least be aware of what's out there and what's available. So let's jump right in. T12 was designed by Toshiba Research in Europe. It's a variant of BB84, which is something you've heard quite a bit. It's designed to be provably secure in the finite size regime, and also to be more practical for real-world implementations compared to some idealized protocols. It, as with some other protocols we've seen, introduces decoy states. It also has optimized parameter estimation. This makes it really resilient to known attacks, like the photon number splitting attack and the detector side channel attack. Now Toshiba actually markets products using this. Something we said in the very first lesson is there are real world quantum key…

Contents