Conference PaperPDF Available

Initiated decoy States in Quantum Key Distribution Protocol by 3 ways channel

Authors:

Abstract and Figures

After decades of research, computer scientists have in recent years come close to reaching substantive results which prove the usability of quantum key distribution (QKD). Several QKD protocols and different schemes have surfaced since the last century. Additionally, some of these protocols were created in new algorithms and up until now, have been proven to be secure; however, other scientists only made modifications to previous original protocols. This paper seeks to create a new scheme in QKD that will communicate between two parties and will give them a high level of security against any well-known attacks while handling both of parties in a manner that will reduce their dependency on both classic communication and the classical channel.
Content may be subject to copyright.
1
AbstractAfter decades of research, computer scientists have
in recent years come close to reaching substantive results which
prove the usability of quantum key distribution (QKD). Several
QKD protocols and different schemes have surfaced since the last
century. Additionally, some of these protocols were created in
new algorithms and up until now, have been proven to be secure;
however, other scientists only made modifications to previous
original protocols. This paper seeks to create a new scheme in
QKD that will communicate between two parties and will give
them a high level of security against any well-known attacks
while handling both of parties in a manner that will reduce their
dependency on both classic communication and the classical
channel.
Index TermsQuantum key distribution, EPR pair,
Entanglement state, QKD attacks.
I. INTRODUCTION
OR several centuries, cryptography has been, and still
remains, a challenge to many computer scientists as well
as physicists. As long as more information and data are
transferred from one party to another, there is the need for
even more security for the data and information being
transferred. With regards to security, several schemes were
proven to be either new complicated computing algorithms or
improving existing ones. Cryptography is considered as the art
of encoding and decoding messages, and will remain
necessary as long as cyber eavesdroppers exist. Therefore, the
science of cryptography deals with keeping these information
secure [1].
Today, majority of the biggest systems and applications are
still being run using conventional cryptography, which is still
powerful enough to keep attackers away from stealing or
tapping into any important information. As compared to
quantum computing, classical security systems that depend
upon complicated computing algorithms are extremely weak.
Furthermore, if quantum cryptography became tangible and
useable, conventional cryptography would easy to break [2].
Classical security is still in wide use and several schemes have
shaken up the whole community of security. One of these
schemes was invented by Shor in 1994 and is not only based
on the factorization of prime numbers but still occupies a top
rank in classical cryptography. Also, most encryption theories
are based on mathematical operations, which are usually
capable of being attacked [3]. Quantum Mechanics is a ray of
hope which seeks to change several weaknesses in the
classical system.
II. QUANTUM KEY DISTRIBUTION
A. BB84 protocol
Quantum key Distribution permits in general two parties
so-named Alice (the sender) and Bob (the receiver) to
communicate over the quantum channel with the ability to
realize the occurrence of any form of eavesdropping as Eve
(the eavesdropper), may or may not disturb the established
connection [4]. BB84 protocol, which is still a unique QKD
protocol, is the first step in this approach. Most of today’s
protocols have been designed on the same idea. Bennett and
Brassard in [5] came up with an innovative protocol that
uses the polarization of photons. They also divided the
communication between Alice and Bob into two channels
(Quantum and public channel).
In 2000, Shor and Preskill in [6] proved the BB84
protocol to be a secure quantum protocol. In [7] Gottesman
and others again proved that the security of the BB84 is the
source and detector under a limit control of an adversary.
Also, the above mentioned protocol is still considered as
one of spotlights in the last two decades and has seen
unique transformations between the two parties.
Additionally, [8] proved the BB84 as still standing against
the King Mean Problem that was created by J. Bub in 2001.
Most scientists are of the conviction that quantum
computing is the future for this field. In QKD, if for any
reason interruption occurs, the system will in turn realize it
immediately.
Even though in recent times certain protocols have been
created because the authors mentioned above announced
that the BB84 is unsecure, the BB84 and other protocols
started as first a generation commercial system [9]. In [10]
Scarani et al. implemented another QKD protocol that was
extracted from the previous protocol BB84. SARG04 has
the same features as the BB84 protocol except in a classical
sifting procedure, in which the SARG04 is considered as
robust against the optimal individual eavesdropping as well
as photon-number splitting (PNS) attacks. The existence of
PNS will result in dramatic consequences in security
analysis [11].
This paper will discuss the advantages of BB84 and EPR in
order to improve the new scheme. The new scheme derives
its robustness from the advantages that have already been
discovered in either the BB84 or EPR.
Initiated decoy States in Quantum Key
Distribution Protocol by 3 ways channel
Abdulbast Abushgra, Khaled Elleithy
F
Abdulbast Abushgra Khaled Elleithy
aabushgr@my.bridgeport.edu elleithy@bridgeport.edu
Department of Computer Science & Engineering
University of Bridgeport, CT USA
2
B. EPR Protocol
EPR in [12] was invented by Einstein, Podolsky, and
Rosen, who presented the EPR paradox in 1935. In their
paper, they argued about the completeness of physical
theory in quantum mechanics. Basically, the EPR protocol
is defined by EPR pair as:
|>
>>,
|>
>>.
Where |0> and |1> are the eigenvectors of the Pauli
operator, which the single photon will be measured by one
of the legitimate parties that end up destroying the
measurement state, and also determine the measurement of
a particular state. For instance, measuring one of the created
photons in the Bell’s state |> and getting |1> that means
the other photon will collapse to the state |0> [13]. To
authenticate the communication, Alice can follow this
scenario by using redundant coding, which she can encode
one bit by two qubits [14].


EPR protocol has been modified in several researches
and papers as [15] where Hwang and Lee tried to add more
efficiency to the protocol. Both Alice and Bob are able to
generate the EPR pair which the receiver can preserve. One
of the assumptions here is that no collision occurs between
the photon states, and the used measurement system is
polarization as described above. Moreover, Dong and others
in [16] presented a multiparty Quantum Secret Sharing
(QSS) protocol that is based on entanglement swapping and
random EPR selection, which has raised the probability of
detecting the eavesdropper to 95.8%, which means more
efficiency.
III. THE NEW QUANTUM KEY SCHEME
As mentioned above, the new scheme can be reflected on
one of the protocols that are extracted by BB84, or more
precisely the new scheme can be transmitted into the
quantum channel initializing two, four, or six states.
Generally, computer scientists believe quantum mechanics
is not the whole solution but rather part of it. They also
know that the law of physics can be a major aspect of
creating a security system, where QKD protocols have
proved two parties as being able to establish a
communication under generating a secret binary string that
is totally random [17]. Now as cryptography, we still need
more of complicated computing as well as some tricks to
provide perfection to our protocols.
In this paper, we provide a new QKD protocol that will
use different systematic processes of submitting channels,
where we try to capitalize on the advantage of the law of
physics, the variety of BB84 and EPR protocol.
A. Proposal Scheme
The new protocol practically utilizes the features of EPR
pairs to ensure the authentication of the initiated
communication between the two parties that generally raises
the reliability and the accuracy of the protocol to more than
50% as compared to the other protocols such as regular BB84.
Moreover, The BB84 is used in this scheme as fundamental
polarization, in which the sender party can create the electron
(photon) in four bases by sending the photon randomly in
different states. Also, the length of the code depends upon the
text that Alice wants to share with Bob. Here, the steps of the
proposed protocol are explained in sequentially as follows:
- Step 1: Alice creates n EPR pair, keeps photon A and
sends photon B to Bob as shown in [18],[19] and [20],
this string of photons includes the authentication key,
the length (includes the dimension of the matrix) of
next sent qubits and the time when Alice starts
submitting the first qubit (giving the signature and
confidentiality to Bob).
|>
>>,
|>
>>,
|>
>>,
|>
>>.
- Step 2: Bob resends the authentication key and the
bases code into the first channel (orthogonal basis = 0,
and orthonormal = 1) this is done by creating an
auxiliary qubit and which is then transferred into C-
NOT gate.
- Step 3: Alice starts preparing the bits and passes them
through the polarization device. This process will be
done by entering the code bits randomly in lower
triangle (l) and filling in the upper triangle (u)
sequentially. After this, she modifies every row to be
even by filling the diagonal with (0 or 1); hence,
making the rows even.
Figure (1) shows the table that prepared by Alice
3
- Step 4: Alice submits the rows of prepared matrix in
random selections, where she picks up different indices
every time, and then submits the whole string of
photons to Bob. Here, I would mention to Eve that she
cannot figure out the submitted qubits because they
have been submitted in the rows randomly.
Figure (2) shows the submitted string of qubits
- Step 5: Bob at the other side measures the upcoming
qubits from Alice that are supposed to be in either {|0>,
|1>, |+>, |>} in random bases {+ or ×}. He measures
the qubits into Pauli-Matrices operators (z, x). Next, he
places the measured qubits in the well-known matrix
and then starts to sort the matrix as Alice mentioned in
EPR communication.
 
 ,  
 .
- Step 6: Bob sends just the upper triangle to Alice in a
sorted string of one basis (the agreement was fulfilled
since the first communication). If Alice agreed to the
received photons, she will end the quantum
communication and start the classical channel. On the
other hand, if Alice does not accept the upper triangle
that was sent by Bob, she will send the measured bases
in sequence to Bob by classical channel (1 and 0).
  
 
  
Where is the whole qubits that are represented
in one matrix and should be sent to Bob row by row.
- Step 7: Bob compares the measured qubits with those
sent by Alice. If the measured qubits contains
differences, he will then know that a third party was
existent and tapping or eavesdropping. In this case he
informs Alice to ignore the interrupted ones or rejects
the whole communication if the rate of interrupted
qubits is over 50%.
Figure (3) shows the new scheme diagram.
The new scheme demonstrates a protocol that contains
three ways of communication between two parties. It begins
by affirming the authentication prior to starting the transfer
of the encoded qubits by quantum channel. The first
communication will be processed by the EPR channel
where both of the legitimate parties do not need to keep
their information in the memory for a long time. In addition,
this information should be short and effective. The second
scenario of the communication is transferring the encoded
information into the two bases quantum system, which is
considered as BB84 in the polarization system. One of the
advantages in this protocol is the reduction of classical
communication to the last station in order to confirm the
previous transfers, and to combine the reconciliation and
error correction in the connection steps.
B. The simulation
The new protocol has been examined to have certain
common features with protocols such as the BB84. This
was done by creating a certain level of noise in the channels
of both protocols. The created noises comprised White
Gaussian Noise, Intercept-Resend (IRA) Attack and others.
Our protocol recorded a high ability to stand resist the IRA
attack when it was applied and measured with BB84. It also
recorded a higher ratio as compared to BB84 as shown in
table [1]:
TABLE I
THE RATIO OF THE SUBMITTED QUBITS.
BB84
New Protocol
0.4063
0.5200
0.5000
0.5278
0.5703
0.5714
Therefore, as shown in Figure (4), the applied correlation
between the submitted and received photons is shown to be
more linear in BB84’s figure unlike new scheme. On the
other hand, the measurements were timed before
exchanging channels. This means, whereas in the BB84, the
attacker can gain some data by IRA, in the new scheme, it is
very difficult to monitor any data.
4
Figure (4) shows the correlation between the BB84 and the new scheme.
Furthermore, the protocols were experimented under the
White Noise Gaussian (WNG), which assists to figure out
weakness through sending and receiving photons; especially
regarding submitting and exchanging channels as
mentioned in figure [3].
Figure (5) shows the WNG applied to both protocol.
As pointed above, the new protocol is more reliable and
efficient, due to the establishment the authentication that
verifies the two communicating parties before going
forward. Also, the decoy states that are initiated in a matrix
make eavesdropping very complicated to figure out at least
for now. Unlike the use of classical decoy that should be
created in well-known algorithms in quantum devices, one
of the advantages in the new protocol is its ability to exploit
the decoy states. In addition, the new protocol is guaranteed
by the strength of the matrix.
Figure (6) shows the NOISE to the BB84 and the new scheme.
Even though noise was created in both protocols, the
BB84 protocol demonstrated more weakness as compared
to the new scheme. This is because the new protocol is not
affected by noise that is either caused by the environment,
dark count probability or by an attacker. Reason being,
Alice and Bob ensure that both of them are the legitimate
parties; hence, making the next mechanism unknown except
to one of them.
IV. SECURITY ANALYSIS
This section discusses the scenario of the proposal protocol
and how the protocol is able to fight against many different
types of quantum attacks. As known, the fake-signal attack is
commonly seen in quantum security [21]. Supposing Eve is
able to copy some of these photons and and sends
fake-photons to Bob, the proposal scheme in turn will ensure
the inability of reaching Eve to the desired secret key. This is
due to the asymmetric decoy states that are embedded in the
submitted photons between Alice and Bob.
Men-In-Middle attack is a form of quantum attack [22], and
this attack depends totally on measuring the pulse that is
created with more than one photon, where Eve just keeps one
of these photons and leaves the other without any interruption.
The new scheme leaves MIM attack with nothing even if Eve
catches some photons. Next, due to the use of the asymmetric
decoy states in the new scheme, the Denial-Of-Service attack
(DoS) suffers strict processes that have been explained above.
The point here is when Bob measures the submitted photons in
sequence, he will realize whether Eve interrupted the
connection or not.
To increase the security of the proposed scheme, Alice and
Bob share the only function that forms the density of the
matrix (), where n is the length of text that is needed to
be encoded as well as this length is invisible except Alice and
Bob. As mentioned in [23] the Photon Number Splitting (PNS)
attack can be computed, and its efficiency determined by
computing the density matrices is associated with n photon-
pulses. Furthermore, PNS is still unable to be processed or
completely efficient by Eve without establishing another
attack that so-called Intercept-resend with unambiguous
discrimination (IRUD) attack, which is still possible in our
scheme; however, fortunately without gaining any
information.
V. THE CONCLUSION
The proposed scheme is proved to be more secure than
BB84, where the eavesdropper cannot realize the secret key
even with caching some of the photons and resending others.
Additionally, requesting the authentication at the beginning
increases the level of security, where at the first channel the
legitimate party can ignore the communication or resume it
and then move to the next step. Therefore, the protocol has
been designed for resisting attacks even in weak scenarios,
where Eve will not have any useful combination of submitted
data.
5
VI. REFERENCES
[1] M. Bhatt, A. Aneja, and S. Tripathi, "Classical Cryptography v/s
Quantum Cryptography A Comparative Study."
[2] D. G. a. H.-K. Lo, "From Quantum Cheating to Quantum
Security," the American Institute of Physics, vol. 53, p. 18, Nov. 22
2000 2000.
[3] B. Sun, S. Hao, X. Zhang, and Z. Wang, "An Improved Method of
Quantum Key Distribution Protocol," in Computer Science-
Technology and Applications, 2009. IFCSTA '09. International
Forum on, 2009, pp. 115-117.
[4] Z.-F. H. a. H.-w. Li, "Security of practical quantum key
distribution system," 2011 International Symposium on Intelligent
Signal Processing and Communication Systems (ISPACS)
December 7-9, 2011, vol. 11, pp. 1-3, Dec. 7-9 2011 2011.
[5] C. H. Bennett and G. Brassard, "Quantum cryptography: Public
key distribution and coin tossing," in Proceedings of IEEE
International Conference on Computers, Systems and Signal
Processing, 1984.
[6] P. W. Shor and J. Preskill, "Simple proof of security of the BB84
quantum key distribution protocol," Physical Review Letters, vol.
85, p. 441, 2000.
[7] D. Gottesman, L. Hoi-Kwong, Lu, x, N. tkenhaus, and J. Preskill,
"Security of quantum key distribution with imperfect devices," in
Information Theory, 2004. ISIT 2004. Proceedings. International
Symposium on, 2004, p. 136.
[8] M. Yoshida, T. Miyadera, and H. Imai, "On the security of the
quantum key distribution using the Mean King Problem," in
Information Theory and its Applications (ISITA), 2010
International Symposium on, 2010, pp. 917-912.
[9] L. Oesterling, D. Hayford, and G. Friend, "Comparison of
commercial and next generation quantum key distribution:
Technologies for secure communication of information," in
Homeland Security (HST), 2012 IEEE Conference on Technologies
for, 2012, pp. 156-161.
[10] A. A. Valerio Scarani, Gregoire Ribordy and Nicolas Gisin,
"Quantum cryptography protocols robust against photon number
splitting attacks," p. 2, 2004.
[11] V. Scarani, A. Acin, G. Ribordy, and N. Gisin, "Quantum
cryptography protocols robust against photon number splitting
attacks for weak laser pulse implementations," Physical Review
Letters, vol. 92, p. 057901, 2004.
[12] A. Einstein, B. Podolsky, and N. Rosen, "Can quantum-mechanical
description of physical reality be considered complete?," Physical
review, vol. 47, p. 777, 1935.
[13] H. Ma and S. Wang, "High performance quantum cryptography
architectures in IEEE 802.11 WLAN," in Advanced Computer
Control (ICACC), 2010 2nd International Conference on, 2010,
pp. 332-335.
[14] L. Xiaoyu and Z. Dexi, "Quantum information authentication using
entangled states," in Digital Telecommunications, , 2006. ICDT
'06. International Conference on, 2006, pp. 64-64.
[15] T. Hwang and K.-C. Lee, "EPR quantum key distribution protocols
with potential 100% qubit efficiency," Information Security, IET,
vol. 1, pp. 43-45, 2007.
[16] D. Jian, T. Jianfu, and S. Wang, "A modified protocol of quantum
state sharing based on entanglement swapping and random EPR
selection," in Neural Networks and Signal Processing, 2008
International Conference on, 2008, pp. 238-242.
[17] Z. Chen, Z. Qin, and X. Wang, "A quasi quantum secure direct
communication protocol with authentication," in Computer Science
and Information Technology (ICCSIT), 2010 3rd IEEE
International Conference on, 2010, pp. 48-52.
[18] L. Xiaoyu and C. Liju, "Quantum Authentication Protocol Using
Bell State," in Data, Privacy, and E-Commerce, 2007. ISDPE
2007. The First International Symposium on, 2007, pp. 128-132.
[19] R. Blume-Kohout, S. Croke, and D. Gottesman, "Streaming
Universal Distortion-Free Entanglement Concentration,"
Information Theory, IEEE Transactions on, vol. 60, pp. 334-350,
2014.
[20] L. Zhihao, C. Hanwu, L. Wenjie, and X. Juan, "Mutually
authenticated quantum direct communication based on
entanglement swapping," in Natural Computation (ICNC), 2010
Sixth International Conference on, 2010, pp. 2984-2988.
[21] G. Fei, Q. Su-Juan, G. Fen-Zhuo, and W. Qiao-Yan, "Dense-
Coding Attack on Three-Party Quantum Key Distribution
Protocols," Quantum Electronics, IEEE Journal of, vol. 47, pp.
630-635, 2011.
[22] A. Buhari, Z. A. Zukarnain, S. K. Subramaniam, H. Zainuddin, and
S. Saharudin, "A single photon quantum user Bi-directional
authentication scheme over noiseless channel," in Industrial
Electronics and Applications (ISIEA), 2012 IEEE Symposium on,
2012, pp. 1-6.
[23] F. G. a. F. Grosshans, "Photon-Number-Splitting-attack resistant
Quantum Key Distribution Protocols without sifting," p. 11,
September 3 2013 2013.
VII. BIOGRAPHY
Abdulbast A. Abushgra, He is a PhD
candidate in Computer Science &
Engineering at University of Bridgeport.
He has served as professor assistant at Al-
Mergib University in Libya since 2007.
Also, he has worked in the Railroad
Company for 10 years as an advisor. Now,
his work focuses on the quantum
cryptography, and how to make a sharing secret key by
Quantum Mechanics is possible in our classical system.
Khaled Elleithy, He is the Associate
Vice President for Graduate Studies and
Research at the University of Bridgeport.
He is a professor of Computer Science
and Engineering. He has research interests
in the areas of wireless sensor networks,
mobile communications, network
security, quantum computing, and formal
approaches for design and verification. He has published more
than three hundreds research papers in international journals
and conferences in his areas of expertise.
... Using a matrix in preparing a quantum string is introduced in AK15 protocol [5], where the sender prepares the qubits by filling the converted plaintext into the matrix (or matrices). On the other hand, Bob measures the upcoming qubits by re-sorƟng the qubit string in the matrix. ...
... The AK15 protocol is a quantum protocol to treat the authentication between the legitimate parties. This protocol was presented in 2015 [5] by A. Abushgra and K. Elleithy. The major idea of designing this protocol is to improve the efficiency of the submission of qubits. ...
Article
Full-text available
Quantum cryptography is catching the attention of scientists; it is considered to be the future of the security world. Quantum key distribution (QKD) is defined as sharing a secret key under unconditional cases. The mechanism that maps the photons through different scenarios is called a protocol. QKD protocols have been presented such as BB84, KMB09 and AK15. This paper will be focused on the KMB09 and AK15 protocol and show the efficiency of using the indices to encode and decode the transmi4ed particles. Moreover, the paper presents the power and the weaknesses of both protocols.
... The main concept uses three states of polarization considering |θ , where the polarization state of the photon is linearly polarized at angle θ. More precisely, the EPR is a pair of particles that can be separated even over a great distance, so that both photons show in a paradox "action at a distance" [54]. ...
Article
Full-text available
Cryptography is an unexpected revolution in information security in the recent decades, where remarkable improvements have been created to provide confidentiality and integrity. Quantum cryptography is one such improvement that has grown rapidly since the first announced protocol. Quantum cryptography contains substantial elements that must be addressed to ensure secure communication between legitimate parties. Quantum key distribution (QKD), a technique for creating a secret key, is one of the most interesting areas in quantum cryptography. This paper reviews some well-known quantum key distribution techniques that have been demonstrated in the past three decades. Furthermore, this paper discusses the process of creating a secret key using quantum mechanics and cryptography methods. Moreover, it explains the relationships between many basic aspects of QKD protocols and suggests some improvements in the cryptosystem. An accurate quantitative comparison between the QKD protocols is presented, especially the runtime execution for each QKD protocol. In addition, the paper will demonstrate a general model of each considered QKD protocol based on security principles.
... Next, Alice establishes a quantum connection to send the prepared plaintext IQUBIT (qubits in superposition states) to Bob. Then, Bob will use the wellknown Pauli-matrices ( , , ) based on the received String IEPR to measure each upcoming qubit sequentially [29]. ...
Article
Full-text available
Quantum key distribution (QKD) is an innovative solution in the cryptography world to prevent the information leakage that can sometimes be deliberate. Several QKD protocols were recently presented for building a secure shared key, of which the BB84 protocol is one of those interesting protocols. The authentication between the communicating parties is one of the issues that causes a huge argument. Furthermore, the current well-known QKD protocols are not yet ready to realize the personality of either the sender or the receiver, although the QKD protocol is already protected by the rules of physics and quantum mechanics to detect any interruption. This paper introduces a new QKD protocol that utilizes two quantum channels to provide authenticated communications for legitimate parties. Moreover, the proposed QKD protocol uses two type of physical behaviors, entanglement and superposition states. The entangled states are utilized to confirm the authentication between the end users, while the superposition states carry the secret key that will be shared between the users.
Article
Cryptography is a scientific method that is used to transmit secret information. In contrast, quantum cryptography depends on physical laws to encrypt information; when the quantum computer appeared, the classic encryption method becomes inefficient. The quantum method is commonly used to distribute keys, a process called as quantum key distribution (QKD). In this paper, we consider the efficiency of the quantum method compared to classical methods. Also, we discuss the security of QKD against several attacks and provide security analysis based on probabilistic models. Additionally, the paper explains how to encrypt random numbers into a sequence of photons using a QKD system for the distribution of a key. This research demonstrates the efficiency and security of QKD in sending and distributing keys between communication parties. Thus, both the sender and the receiver would be able to obtain a security key using the quantum method rather than classical methods.
Conference Paper
Full-text available
Quantum key distribution (QKD) is the future of the cryptography world. The QKD was invented to increase the security rate when exchanging a private key. Since 1984, several experimental attempts to design protocols have been developed based upon the rule of physics. These QKD protocols were represented by different algorithms with limited ability to stand up against quantum attacks. This paper evaluates the most functional QKD protocols in the cryptography field and explains every QKD protocol as well illustrates the features that were utilized in each protocol.
Article
Full-text available
This paper provides a quantum information authentication protocol using entangled states. The two parties share EPR (Einstein-Podolsky-Rosen) pairs as authentication key. Information is coded in two-qubits systems. The two parties confirm the validity of the information by making the coding systems to interact with the authentication key. We prove that information from anyone who has no authentication key can't pass the authentication. So our protocol is secure. If there are no errors and eavesdroppers existing in transmission, the authentication key can be reused
Article
Full-text available
We propose a family of sifting-less quantum-key-distribution protocols which use reverse-reconciliation, and are based on weak coherent pulses (WCPs) polarized along m different directions. When m=4, the physical part of the protocol is identical to most experimental implementations of BB84 and SARG04 protocols and they differ only in classical communications and data processing. We compute their total keyrate as function of the channel transmission T, using general information theoretical arguments and we show that they have a higher keyrate than the more standard protocols, both for fixed and optimized average photon number of the WCPs. When no decoy-state protocols (DSPs) are applied, the scaling of the keyrate with transmission is improved from T<sup>2</sup> for BB84 to T^(1+1/(m-2)). If a DSP is applied, we show how the keyrates scale linearly with T, with an improvement of the prefactor by 75.96 % for m=4. High values of $ m $ allow to asymptotically approach the keyrate obtained with ideal single photon pulses. The fact that the keyrates of these sifting-less protocols are higher compared to those of the aforementioned more standard protocols show that the latter are not optimal, since they do not extract all the available secret key from the experimental correlations.
Article
In this era of information technology, the need for security has attained paramount importance. As most of our sensitive information is stored in computers the need of data security becomes increasingly important. Protecting this information against unauthorized access is therefore a major concern for both operating systems and users alike. Cryptography is one such method of safeguarding sensitive data from being stolen or intercepted by unwanted third parties. Traditional cryptology is certainly clever, but as with all encoding methods in code-breaking history, it's being phased out. Quantum cryptography uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages. By harnessing the unpredictable nature of matter at the quantum level, physicists have figured out a way to exchange information on secret keys. Attaching information to the photons spin is the essence of Quantum Cryptology. In brief, the processes of encoding (cryptography) and decoding (crypto analysis) information or messages (called plaintext) into an otherwise meaningless data (cipher text) combined are cryptology. And when the keys used for this process are photons, it's called Quantum Cryptology.
Conference Paper
Battelle has been actively exploring emerging quantum key distribution (QKD) cryptographic technologies for secure communication of information with a goal of expanding the use of this technology by commercial enterprises in the United States. In QKD systems, the principles of quantum physics are applied to generate a secret data encryption key, which is distributed between two users. The security of this key is guaranteed by the laws of quantum physics, and this distributed key can be used to encrypt data to enable secure communication on insecure channels. To date, Battelle has studied commercially available and custom-built QKD systems in controlled laboratory environments and is actively working to establish a QKD Test Bed network to characterize performance in real world metropolitan (10-100 km) and long distance (>; 100 km) environments. All QKD systems that we have tested to date utilize a discrete variable (DV) binary approach. In this approach, discrete information is encoded onto a quantum state of a single photon, and binary data are measured using single photon detectors. Recently, continuous variable (CV) QKD systems have been developed and are expected to be commercially available shortly. In CV-QKD systems, randomly generated continuous variables are encoded on coherent states of weak pulses of light, and continuous data values are measured with homodyne detection methods. In certain applications for cyber security, the CV-QKD systems may offer advantages over traditional DV-QKD systems, such as a higher secret key exchange rate for short distances, lower cost, and compatibility with telecommunication technologies. In this paper, current CV- and DV-QKD approaches are described, and security issues and technical challenges fielding these quantum-based systems are discussed. Experimental and theoretical data that have been published on quantum key exchange rates and distances that are relevant to metropolitan and long distance network applications - re presented. From an analysis of these data, the relative performance of the two approaches is compared as a function of distance and environment (free space and optical fiber). Additionally, current research activities are described for both technologies, which include network integration and methods to increase secret key distribution rates and distances.
Conference Paper
In this paper, we propose a quantum user authentication protocol with single photon based on short shared secret key and quantum bit error ratio verification. In this scheme, usage of proposed deterministic quantum key distribution technique and simple verification in a public channel culminate reduced photon transmission. Security analysis proves our proposed scheme is resistant to impostors' attacks and eavesdropper. Furthermore, our proposed protocol can extend to multiparty environment and permits to re-use many times of the shared secret key without revealing it.
Article
Security proof of practical quantum key distribution (QKD) with imperfect devices has attracted a lot of attentions in recent years. We give a brief introduction about security of practical QKD system with imperfect state preparation, state modulation in this paper.
Article
Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, and point out that they are susceptible to a simple and effective attack, i.e., the dense-coding attack. It is shown that the eavesdropper Eve can totally obtain the session key by sending entangled qubits as the fake signal to Alice and performing collective measurements after Alice's encoding. The attack process is just like a dense-coding communication between Eve and Alice, where a special measurement basis is employed. Furthermore, this attack does not introduce any errors to the transmitted information and consequently will not be discovered by Alice and Bob. The attack strategy is described in detail and a proof for its correctness is given. Finally, the root cause of this insecurity and a possible way to improve these protocols are discussed.
Conference Paper
The quantum communication is a new-style communication scheme based on quantum mechanics. It arouses much interest recently. In this paper, a novel quantum secure communication protocol is proposed. This is a quasi quantum secure direct communication protocol, since it closely unites the quantum key distribution and the classical communication. In the protocol, a key is distributed between both parties participating in communication using EPR pairs, the secret message is sent through classical public channel and the both are closely combined. The protocol applies a braid-based key agreement protocol to let both parties share a secret random number, whose size and magnitude are undecided in advance. It is used to perform all the authentications of the communication. So the communication is simplified. The security of the proposed protocol is based on the no-cloning theorem and the fact that the p-th root finding problem on braid groups is intractable even on quantum computers, as well as classical computers.