A simulation of the BB84 protocol in a Jupyter Notebook using the code from https://qiskit.org/textbook/ch-algorithms/quantum-key-distribution.html. Protocol steps until key sifting have been implemented. Error correction & parameter estimation were not executed.
-
Updated
Sep 6, 2024 - Jupyter Notebook