skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Y. Banadaki and H. Kesineni"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Quantum computation is gaining popularity as a practical application of quantum physics based on quantum superposition, entanglements, and the no-cloning theorem. Because the security of electronic transactions is vital, various cryptographic protocols based on distributed keys between the intended participants have been created. Complex mathematical models and lengthy keys determine the security of these protocols. These keys, on the other hand, are readily broken. The security of information has undergone a paradigm shift as a result of quantum technologies. The quantum circuits in this thesis were constructed utilizing the IBM quantum experience platform with the goal of realizing safe quantum key distribution (BB84 algorithm). With increasing the number of runs, the possibility of these circuits being realized on a practical quantum computer accessed through the IBM QX online platform increased. Furthermore, there is a significant likelihood of identifying the presence of a third party. The probability of identifying a third-party stealing information increases as the number of qubits increases. 
    more » « less