Quantum key distribution protocols and the questions of their protection were studied. There were estimated mutual influences between legitimate users and for any types of cracker attack. For example, BB84 protocol is shown to be unconditional security protocols using photon polarization between outlying channels. Secret keys share between spatially separated (removed or remote) legitimate users. A simple method of generating a dichotomy signal has also been accomplished. In fact, this method can open the way of probabilistic quantum states. We argue that quantum cryptographic systems can be partially simulate on a classical computer with finite degrees of freedom. Quantum entanglement is a basic tool of communication and processing of the information.

Authors

Publisher

INST MECHANICS CONTINUA & MATHEMATICAL SCIENCES

Language

English

Pages

447-455

Status

Published

Year

2019

Organizations

^{1}Moscow Inst Phys & Technol, Moscow, Russia^{2}Peoples Friendship Univ Russia RUDN Univ, Moscow, Russia

Keywords

Quantum Cryptography; Entangled State

Date of creation

24.12.2019

Date of change

24.12.2019

Share

JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES.
INST MECHANICS CONTINUA & MATHEMATICAL SCIENCES.
2019.
P. 438-446

JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES.
INST MECHANICS CONTINUA & MATHEMATICAL SCIENCES.
2019.
P. 456-464