Closed metapunkkk closed 1 year ago
Hi @Nizdew, it's a good attempt, but this implementation does not use QuNetSim at all. The goal is to use the QuNetSim to create the network and have a trusted node to relay the key, writing down the protocols explicitly like one does when developing a QuNetSim simulation. Unfortunately I will have to reject this PR.
In this implementation we simulate a three-node network where Alice sends qubits to Bob through a trusted node. I implemented a simulation of the BB84 QKD protocol using the Qiskit quantum computing framework.