From the course: Quantum Networking by Pearson
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Comparing QKD protocols
From the course: Quantum Networking by Pearson
Comparing QKD protocols
Now, this is one of our briefer lessons, because all we're going to do is kind of give you a summary of what we've talked about in the previous lessons where we've looked at everything from BB84 to CAL, SYN, NOT, SYN, and many others. Let's give you an overview, a comparison. Now this chart is a really nice one to start looking at some of the mainstream protocols, the more exotic ones we talked about in Lesson 5. It tells you specifically how the security is done. How do we get the photons? What do we know about detector security? So for example BB84 is vulnerable to side-channel attacks. MDI QKD, as we discussed, fully removes the measurement device trust. What is the finite key security. We can see the T12 has tight finite size bounds. E91 is difficult due to entanglement. And SNS, send not send, quantum key distribution, it does support this. We also compare the security. We compare the distance, what algorithms or what protocols work best at long distance. You can see the send not…
Contents
-
-
Quantum networking: Introduction2m 28s
-
Defining quantum networks11m 23s
-
(Locked)
The structure of quantum networks4m 39s
-
(Locked)
Examples of quantum networks18m 56s
-
(Locked)
Common quantum key distribution (QKD) protocols14m 24s
-
(Locked)
Less common QKD protocols5m 25s
-
(Locked)
Comparing QKD protocols3m 34s
-
(Locked)
QKD variations12m 59s
-
(Locked)
Quantum error correction6m 10s
-
(Locked)
Quantum information theory17m 26s
-