QKD BB84 Protocol Benchmark
Benchmark evaluating quantum key distribution throughput and security using the BB84 protocol, the foundational QKD scheme proposed by Bennett and Brassard in 1984. The secure bound of the quantum bit error rate (QBER) for BB84 is approximately 11%, extendable to 12.6% with six-state variants. Benchmarks assess secret key rates, QBER tolerance, and distance limits under coherent attacks with decoy-state methods.[1]
- Algorithm: BB84 quantum key distribution protocol
- Category: cryptography
- Framework: SimulaQron, Qiskit (simulation)
- Hardware: Photonic QKD systems
- Reproducible: Yes
- Published:
- QKD
- BB84
- key-distribution
- cryptography
- security
What algorithm does QKD BB84 Protocol Benchmark use?
QKD BB84 Protocol Benchmark uses the BB84 quantum key distribution protocol algorithm, categorized under cryptography.
Frequently Asked Questions
What is the QKD BB84 Protocol Benchmark benchmark?
Benchmark evaluating quantum key distribution throughput and security using the BB84 protocol, the foundational QKD scheme proposed by Bennett and Brassard in 1984. The secure bound of the quantum bit error rate (QBER) for BB84 is approximately 11%, extendable to 12.6% with six-state variants. Benchmarks assess secret key rates, QBER tolerance, and distance limits under coherent attacks with decoy-state methods.
Is QKD BB84 Protocol Benchmark reproducible?
Yes, this benchmark is reproducible.