Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A Simulated QKD Protocol Using KCBS Contextuality: Comparison with BB84

View through CrossRef
This paper presents a detailed theoretical and simulation-based comparison between the BB84 quantum key distribution (QKD) protocol and a proof-of-concept contextuality-based QKD protocol (CTX-QKD) under depolarizing noise. We begin by contrasting classical cryptography’s computational security with quantum cryptography’s information-theoretic guarantees. The physics of quantum cryptography, including superposition, entanglement, and the no-cloning theorem, is explored, followed by a mathematical analysis of BB84 and a proposed CTX-QKD framework. Performance metrics include the quantum bit error rate (QBER) for BB84 and contextuality violation measures for CTX-QKD, with confidence intervals derived from proper statistical bounds. A comprehensive simulation methodology using QuTiP, NumPy, and SciPy is described. Simulation results demonstrate that while BB84 shows expected noise tolerance up to 11% QBER, the CTX-QKD protocol maintains strong contextuality violations of the fundamental security condition under high noise conditions where BB84 fails. This study highlights the potential of contextuality as a resource for quantum cryptography and demonstrates a proof-of-concept for physics-based cryptographic security beyond traditional approaches.
Title: A Simulated QKD Protocol Using KCBS Contextuality: Comparison with BB84
Description:
This paper presents a detailed theoretical and simulation-based comparison between the BB84 quantum key distribution (QKD) protocol and a proof-of-concept contextuality-based QKD protocol (CTX-QKD) under depolarizing noise.
We begin by contrasting classical cryptography’s computational security with quantum cryptography’s information-theoretic guarantees.
The physics of quantum cryptography, including superposition, entanglement, and the no-cloning theorem, is explored, followed by a mathematical analysis of BB84 and a proposed CTX-QKD framework.
Performance metrics include the quantum bit error rate (QBER) for BB84 and contextuality violation measures for CTX-QKD, with confidence intervals derived from proper statistical bounds.
A comprehensive simulation methodology using QuTiP, NumPy, and SciPy is described.
Simulation results demonstrate that while BB84 shows expected noise tolerance up to 11% QBER, the CTX-QKD protocol maintains strong contextuality violations of the fundamental security condition under high noise conditions where BB84 fails.
This study highlights the potential of contextuality as a resource for quantum cryptography and demonstrates a proof-of-concept for physics-based cryptographic security beyond traditional approaches.

Related Results

Security of Quantum Key Distribution Protocols
Security of Quantum Key Distribution Protocols
The counter-intuitive features of quantum mechanics make it possible to solve problems and perform tasks that are beyond the abilities of non-quantum (classical) computers and comm...
Finite Key Analysis for Discrete Phase Randomized BB84 Protocol
Finite Key Analysis for Discrete Phase Randomized BB84 Protocol
Abstract Quantum key distribution (QKD) is a secure communication method that relies on the inherent randomness of quantum mechanics to ensure information-theoretic securit...
Contextuality in Collective Intelligence: Not There Yet
Contextuality in Collective Intelligence: Not There Yet
Type I contextuality or inconsistent connectedness is a fundamental feature of both the classical as well as the quantum realms. Type II contextuality (true contextuality or CHSH t...
Phase-error-rate analysis for asynchronous measurement-device-independent quantum key distribution
Phase-error-rate analysis for asynchronous measurement-device-independent quantum key distribution
Abstract Quantum key distribution (QKD) is a theoretically unconditionally secure key distribution method based on quantum mechanical principles. Currently, most ...
Abstract 214: Outcomes of KD by the KD type: Linking Inpatient and Outpatient Follow-up Data
Abstract 214: Outcomes of KD by the KD type: Linking Inpatient and Outpatient Follow-up Data
Background: The relationship between KD type and outcomes is not well described. We sought to describe the incidence of KD outcomes based on type of KD presentation. ...
Enabling CV-MDI-QKD for weakly squeezed states using non-Gaussian operations
Enabling CV-MDI-QKD for weakly squeezed states using non-Gaussian operations
AbstractWe propose a new non-Gaussian version of the continuous variables measurement device independent quantum key distribution (CV-MDI-QKD) protocol by utilizing a photon added-...
Enhanced BB84 Quantum Key Distribution Protocol with Index-Based Qubit Tagging and Correction Method
Enhanced BB84 Quantum Key Distribution Protocol with Index-Based Qubit Tagging and Correction Method
Quantum Key Distribution (QKD) leverages quantum mechanical principles to establish information-theoretically secure cryptographic keys. The cornerstone BB84 protocol, however, suf...
Convergence of quantum and classical communications
Convergence of quantum and classical communications
Convergence des communications quantiques et classiques Les protocoles de distribution de clé quantique (QKD) permettent de construire des canaux de communications ...

Back to Top