Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A Simulated QKD Protocol Using KCBS Contextuality: Comparison with BB84

View through CrossRef
This paper presents a detailed theoretical and simulation-based comparison between the BB84 quantum key distribution (QKD) protocol and a proof-of-concept contextuality-based QKD protocol (CTX-QKD) under depolarizing noise. We begin by contrasting classical cryptography’s computational security with quantum cryptography’s information-theoretic guarantees. The physics of quantum cryptography, including superposition, entanglement, and the no-cloning theorem, is explored, followed by a mathematical analysis of BB84 and a proposed CTX-QKD framework. Performance metrics include the quantum bit error rate (QBER) for BB84 and contextuality violation measures for CTX-QKD, with confidence intervals derived from proper statistical bounds. A comprehensive simulation methodology using QuTiP, NumPy, and SciPy is described. Simulation results demonstrate that while BB84 shows expected noise tolerance up to 11% QBER, the CTX-QKD protocol maintains strong contextuality violations of the fundamental security condition under high noise conditions where BB84 fails. This study highlights the potential of contextuality as a resource for quantum cryptography and demonstrates a proof-of-concept for physics-based cryptographic security beyond traditional approaches.
Title: A Simulated QKD Protocol Using KCBS Contextuality: Comparison with BB84
Description:
This paper presents a detailed theoretical and simulation-based comparison between the BB84 quantum key distribution (QKD) protocol and a proof-of-concept contextuality-based QKD protocol (CTX-QKD) under depolarizing noise.
We begin by contrasting classical cryptography’s computational security with quantum cryptography’s information-theoretic guarantees.
The physics of quantum cryptography, including superposition, entanglement, and the no-cloning theorem, is explored, followed by a mathematical analysis of BB84 and a proposed CTX-QKD framework.
Performance metrics include the quantum bit error rate (QBER) for BB84 and contextuality violation measures for CTX-QKD, with confidence intervals derived from proper statistical bounds.
A comprehensive simulation methodology using QuTiP, NumPy, and SciPy is described.
Simulation results demonstrate that while BB84 shows expected noise tolerance up to 11% QBER, the CTX-QKD protocol maintains strong contextuality violations of the fundamental security condition under high noise conditions where BB84 fails.
This study highlights the potential of contextuality as a resource for quantum cryptography and demonstrates a proof-of-concept for physics-based cryptographic security beyond traditional approaches.

Related Results

Security of Quantum Key Distribution Protocols
Security of Quantum Key Distribution Protocols
The counter-intuitive features of quantum mechanics make it possible to solve problems and perform tasks that are beyond the abilities of non-quantum (classical) computers and comm...
Finite Key Analysis for Discrete Phase Randomized BB84 Protocol
Finite Key Analysis for Discrete Phase Randomized BB84 Protocol
Abstract Quantum key distribution (QKD) is a secure communication method that relies on the inherent randomness of quantum mechanics to ensure information-theoretic securit...
Contextuality in Collective Intelligence: Not There Yet
Contextuality in Collective Intelligence: Not There Yet
Type I contextuality or inconsistent connectedness is a fundamental feature of both the classical as well as the quantum realms. Type II contextuality (true contextuality or CHSH t...
Abstract 214: Outcomes of KD by the KD type: Linking Inpatient and Outpatient Follow-up Data
Abstract 214: Outcomes of KD by the KD type: Linking Inpatient and Outpatient Follow-up Data
Background: The relationship between KD type and outcomes is not well described. We sought to describe the incidence of KD outcomes based on type of KD presentation. ...
Optimizing the deployment of quantum key distribution switch-based networks
Optimizing the deployment of quantum key distribution switch-based networks
Quantum key distribution (QKD) networks provide an infrastructure for establishing information-theoretic secure keys between legitimate parties via quantum and authentic classical ...
Entanglement and Geometrical Distances in Quantum Information and Quantum Cryptography
Entanglement and Geometrical Distances in Quantum Information and Quantum Cryptography
The counter-intuitive features of Quantum Mechanics make it possible to solve problems and perform tasks that are beyond the abilities of classical computers and classical communic...
Contextual quantum metrology
Contextual quantum metrology
AbstractWe demonstrate that the contextuality of measurement selection can enhance the precision of quantum metrology with a simple linear optical experiment. Contextuality is a no...
Measuring contextuality in investment preferences
Measuring contextuality in investment preferences
Abstract This study investigates the role of contextuality in investment preference formation, specifically in global investments and major US stocks. Utilizing the "Cont...

Back to Top