Loading…

Interactive simulations for quantum key distribution

Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice an...

Full description

Saved in:
Bibliographic Details
Published in:European journal of physics 2017-05, Vol.38 (3), p.35403
Main Authors: Kohnle, Antje, Rizzoli, Aluna
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c354t-6cc040de0f54bb70e521263342ec826a71ef117736d2d3e357e5a8df9c55b9c13
cites cdi_FETCH-LOGICAL-c354t-6cc040de0f54bb70e521263342ec826a71ef117736d2d3e357e5a8df9c55b9c13
container_end_page
container_issue 3
container_start_page 35403
container_title European journal of physics
container_volume 38
creator Kohnle, Antje
Rizzoli, Aluna
description Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels.
doi_str_mv 10.1088/1361-6404/aa62c8
format article
fullrecord <record><control><sourceid>iop_cross</sourceid><recordid>TN_cdi_iop_journals_10_1088_1361_6404_aa62c8</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>ejpaa62c8</sourcerecordid><originalsourceid>FETCH-LOGICAL-c354t-6cc040de0f54bb70e521263342ec826a71ef117736d2d3e357e5a8df9c55b9c13</originalsourceid><addsrcrecordid>eNp1j81LxDAUxIMoWFfvHnvzYt33mo9mj7LourDgRc8hTRNI3X6YtML-97ZUPOnpwbyZYX6E3CI8IEi5RiowEwzYWmuRG3lGkl_pnCSAjGYgobgkVzHWAIgSWULYvh1s0GbwXzaNvhmPevBdG1PXhfRz1O0wNumHPaWVj0Pw5Th_r8mF08dob37uirw_P71tX7LD626_fTxkhnI2ZMIYYFBZcJyVZQGW55gLSllujcyFLtA6xKKgosoraikvLNeychvDebkxSFcEll4TuhiDdaoPvtHhpBDUTK1mRDUjqoV6itwtEd_1qu7G0E4Dla17RaWiCqZhQFVfucl5_4fz3-JvaeJl9w</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Interactive simulations for quantum key distribution</title><source>Institute of Physics</source><creator>Kohnle, Antje ; Rizzoli, Aluna</creator><creatorcontrib>Kohnle, Antje ; Rizzoli, Aluna</creatorcontrib><description>Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels.</description><identifier>ISSN: 0143-0807</identifier><identifier>EISSN: 1361-6404</identifier><identifier>DOI: 10.1088/1361-6404/aa62c8</identifier><identifier>CODEN: EJPHD4</identifier><language>eng</language><publisher>IOP Publishing</publisher><subject>instructional computer use ; quantum cryptography ; quantum information ; research in physics education</subject><ispartof>European journal of physics, 2017-05, Vol.38 (3), p.35403</ispartof><rights>2017 European Physical Society</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c354t-6cc040de0f54bb70e521263342ec826a71ef117736d2d3e357e5a8df9c55b9c13</citedby><cites>FETCH-LOGICAL-c354t-6cc040de0f54bb70e521263342ec826a71ef117736d2d3e357e5a8df9c55b9c13</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Kohnle, Antje</creatorcontrib><creatorcontrib>Rizzoli, Aluna</creatorcontrib><title>Interactive simulations for quantum key distribution</title><title>European journal of physics</title><addtitle>EJP</addtitle><addtitle>Eur. J. Phys</addtitle><description>Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels.</description><subject>instructional computer use</subject><subject>quantum cryptography</subject><subject>quantum information</subject><subject>research in physics education</subject><issn>0143-0807</issn><issn>1361-6404</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNp1j81LxDAUxIMoWFfvHnvzYt33mo9mj7LourDgRc8hTRNI3X6YtML-97ZUPOnpwbyZYX6E3CI8IEi5RiowEwzYWmuRG3lGkl_pnCSAjGYgobgkVzHWAIgSWULYvh1s0GbwXzaNvhmPevBdG1PXhfRz1O0wNumHPaWVj0Pw5Th_r8mF08dob37uirw_P71tX7LD626_fTxkhnI2ZMIYYFBZcJyVZQGW55gLSllujcyFLtA6xKKgosoraikvLNeychvDebkxSFcEll4TuhiDdaoPvtHhpBDUTK1mRDUjqoV6itwtEd_1qu7G0E4Dla17RaWiCqZhQFVfucl5_4fz3-JvaeJl9w</recordid><startdate>20170501</startdate><enddate>20170501</enddate><creator>Kohnle, Antje</creator><creator>Rizzoli, Aluna</creator><general>IOP Publishing</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20170501</creationdate><title>Interactive simulations for quantum key distribution</title><author>Kohnle, Antje ; Rizzoli, Aluna</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c354t-6cc040de0f54bb70e521263342ec826a71ef117736d2d3e357e5a8df9c55b9c13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>instructional computer use</topic><topic>quantum cryptography</topic><topic>quantum information</topic><topic>research in physics education</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kohnle, Antje</creatorcontrib><creatorcontrib>Rizzoli, Aluna</creatorcontrib><collection>CrossRef</collection><jtitle>European journal of physics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kohnle, Antje</au><au>Rizzoli, Aluna</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Interactive simulations for quantum key distribution</atitle><jtitle>European journal of physics</jtitle><stitle>EJP</stitle><addtitle>Eur. J. Phys</addtitle><date>2017-05-01</date><risdate>2017</risdate><volume>38</volume><issue>3</issue><spage>35403</spage><pages>35403-</pages><issn>0143-0807</issn><eissn>1361-6404</eissn><coden>EJPHD4</coden><abstract>Secure communication protocols are becoming increasingly important, e.g. for internet-based communication. Quantum key distribution (QKD) allows two parties, commonly called Alice and Bob, to generate a secret sequence of 0s and 1s called a key that is only known to themselves. Classically, Alice and Bob could never be certain that their communication was not compromised by a malicious eavesdropper. Quantum mechanics however makes secure communication possible. The fundamental principle of quantum mechanics that taking a measurement perturbs the system (unless the measurement is compatible with the quantum state) also applies to an eavesdropper. Using appropriate protocols to create the key, Alice and Bob can detect the presence of an eavesdropper by errors in their measurements. As part of the QuVis Quantum Mechanics Visualisation Project, we have developed a suite of four interactive simulations that demonstrate the basic principles of three different QKD protocols. The simulations use either polarised photons or spin 1/2 particles as physical realisations. The simulations and accompanying activities are freely available for use online or download, and run on a wide range of devices including tablets and PCs. Evaluation with students over three years was used to refine the simulations and activities. Preliminary studies show that the refined simulations and activities help students learn the basic principles of QKD at both the introductory and advanced undergraduate levels.</abstract><pub>IOP Publishing</pub><doi>10.1088/1361-6404/aa62c8</doi><tpages>15</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0143-0807
ispartof European journal of physics, 2017-05, Vol.38 (3), p.35403
issn 0143-0807
1361-6404
language eng
recordid cdi_iop_journals_10_1088_1361_6404_aa62c8
source Institute of Physics
subjects instructional computer use
quantum cryptography
quantum information
research in physics education
title Interactive simulations for quantum key distribution
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T07%3A23%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-iop_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Interactive%20simulations%20for%20quantum%20key%20distribution&rft.jtitle=European%20journal%20of%20physics&rft.au=Kohnle,%20Antje&rft.date=2017-05-01&rft.volume=38&rft.issue=3&rft.spage=35403&rft.pages=35403-&rft.issn=0143-0807&rft.eissn=1361-6404&rft.coden=EJPHD4&rft_id=info:doi/10.1088/1361-6404/aa62c8&rft_dat=%3Ciop_cross%3Eejpaa62c8%3C/iop_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c354t-6cc040de0f54bb70e521263342ec826a71ef117736d2d3e357e5a8df9c55b9c13%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true