Experimental realization of BB84 protocol with different phase gates and
SARG04 protocol
- URL: http://arxiv.org/abs/2110.00308v1
- Date: Sat, 25 Sep 2021 14:31:18 GMT
- Title: Experimental realization of BB84 protocol with different phase gates and
SARG04 protocol
- Authors: Sinchan Ghosh, Harsh Mishra, Bikash K. Behera, Prasanta K. Panigrahi
- Abstract summary: High computing power can help you crack traditional encryption methods.
Factorization of big numbers may be possible with Shor's algorithm with quantum machines in considerable time.
This paper begins with experimental verification of the BB84 procedure utilizing four bases.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Cryptography in the modern era is very important to prevent a cyber attack,
as the world tends to be more and more digitalized. Classical cryptographic
protocols mainly depend on the mathematical complicacy of encoding functions
and the shared key, like RSA protocol in which security depends upon the fact
that factoring a big number is a hard problem to the current computers. This
means that high computing power can help you crack traditional encryption
methods. Quantum machines claim to have this kind of power in many instances.
Factorization of big numbers may be possible with Shor's algorithm with quantum
machines in considerable time. Apart from this, the main problem is key sharing
i.e., how to securely share the key the first time to validate the encryption.
Here comes quantum key distribution. Two parties who are interested in
communication with each other, create a process, which claims considerable
security against an eavesdropper, by encoding and decoding information in
quantum states to construct and share a secret key. Quantum key distribution
may be done in a variety of ways. This paper begins with experimental
verification of the BB84 procedure utilizing four bases (using phase gates)
followed by the experimental realization of the SARG04 protocol which was
derived from BB84 Protocol to overcome PNS attack. The possibility of a
third-party attack and the effect of noise is considered and implemented. The
IBM Quantum Experience platform was used for all of the implementations.
Related papers
- Key Exchange in the Quantum Era: Evaluating a Hybrid System of Public-Key Cryptography and Physical-Layer Security [12.773068584968804]
We evaluate a key exchange protocol based on combining public-key schemes with physical-layer security.
We outline the protocol, discuss its security, and point out challenges to be resolved.
arXiv Detail & Related papers (2024-12-17T21:56:04Z) - Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - The Quantum Cryptography Approach: Unleashing the Potential of Quantum
Key Reconciliation Protocol for Secure Communication [7.318072482453136]
Quantum Key Distribution (QKD) has been recognized as the most important breakthrough in quantum cryptography.
This paper proposes a novel method that allows users to communicate while generating the secure keys and securing the transmission without any leakage of the data.
arXiv Detail & Related papers (2024-01-17T05:41:17Z) - Public-Key Encryption with Quantum Keys [11.069434965621683]
We study the notion of quantum public-key encryption (qPKE) where keys are allowed to be quantum states.
We show that computational assumptions are necessary to build quantum public-key encryption.
arXiv Detail & Related papers (2023-06-13T11:32:28Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - A quantum encryption design featuring confusion, diffusion, and mode of
operation [0.0]
We propose a non-OTP quantum encryption scheme utilizing a quantum state creation process to encrypt messages.
As essentially a non-OTP quantum block cipher the method stands out against existing methods with the following features.
arXiv Detail & Related papers (2020-10-06T22:23:30Z) - Measurement-device-independent QSDC protocol using Bell and GHZ states
on quantum simulator [0.0]
Quantum Secure Direct Communication (QSDC) protocol eliminates the necessity of key, encryption and ciphertext transmission.
It is a unique quantum communication scheme where secret information is transmitted directly over a quantum communication channel.
We make use of measurement-device-independent (MDI) protocol in this scheme where all the measurements of quantum states during communication are performed by a third party.
arXiv Detail & Related papers (2020-07-01T07:47:59Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.