The Quantum Cryptography Approach: Unleashing the Potential of Quantum
Key Reconciliation Protocol for Secure Communication
- URL: http://arxiv.org/abs/2401.08987v1
- Date: Wed, 17 Jan 2024 05:41:17 GMT
- Title: The Quantum Cryptography Approach: Unleashing the Potential of Quantum
Key Reconciliation Protocol for Secure Communication
- Authors: Neha Sharma and Vikas Saxena
- Abstract summary: Quantum Key Distribution (QKD) has been recognized as the most important breakthrough in quantum cryptography.
This paper proposes a novel method that allows users to communicate while generating the secure keys and securing the transmission without any leakage of the data.
- Score: 7.318072482453136
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum cryptography is the study of delivering secret communications across
a quantum channel. Recently, Quantum Key Distribution (QKD) has been recognized
as the most important breakthrough in quantum cryptography. This process
facilitates two distant parties to share secure communications based on
physical laws. The BB84 protocol was developed in 1984 and remains the most
widely used among BB92, Ekert91, COW, and SARG04 protocols. However the
practical security of QKD with imperfect devices have been widely discussed,
and there are many ways to guarantee that generated key by QKD still provides
unconditional security. This paper proposed a novel method that allows users to
communicate while generating the secure keys as well as securing the
transmission without any leakage of the data. In this approach sender will
never reveal her basis, hence neither the receiver nor the intruder will get
knowledge of the fundamental basis.Further to detect Eve, polynomial
interpolation is also used as a key verification technique. In order to fully
utilize the quantum computing capabilities provided by IBM quantum computers,
the protocol is executed using the Qiskit backend for 45 qubits. This article
discusses a plot of % error against alpha (strength of eavesdropping). As a
result, different types of noise have been included, and the success
probability of the desired key bits has been determined. Furthermore, the
success probability under depolarizing noise is explained for different qubit
counts.Last but not least, even when the applied noise is increased to maximum
capacity, a 50% probability of successful key generation is still observed in
an experiment.
Related papers
- Increasing Interference Detection in Quantum Cryptography using the Quantum Fourier Transform [0.0]
We present two quantum cryptographic protocols leveraging the quantum Fourier transform (QFT)
The foremost of these protocols is a novel QKD method that leverages this effectiveness of the QFT.
We additionally show how existing quantum encryption methods can be augmented with a QFT-based approach to improve eavesdropping detection.
arXiv Detail & Related papers (2024-04-18T21:04:03Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Secure Key from Quantum Discord [22.97866257572447]
We show how to make use of discord to analyze security in a specific quantum cryptography protocol.
Our method is robust against imperfections in qubit sources and qubit measurements as well as basis misalignment due to quantum channels.
arXiv Detail & Related papers (2023-04-12T14:21:49Z) - Simple Tests of Quantumness Also Certify Qubits [69.96668065491183]
A test of quantumness is a protocol that allows a classical verifier to certify (only) that a prover is not classical.
We show that tests of quantumness that follow a certain template, which captures recent proposals such as (Kalai et al., 2022) can in fact do much more.
Namely, the same protocols can be used for certifying a qubit, a building-block that stands at the heart of applications such as certifiable randomness and classical delegation of quantum computation.
arXiv Detail & Related papers (2023-03-02T14:18:17Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Experimental realization of BB84 protocol with different phase gates and
SARG04 protocol [0.0]
High computing power can help you crack traditional encryption methods.
Factorization of big numbers may be possible with Shor's algorithm with quantum machines in considerable time.
This paper begins with experimental verification of the BB84 procedure utilizing four bases.
arXiv Detail & Related papers (2021-09-25T14:31:18Z) - Fault-tolerant Coding for Quantum Communication [71.206200318454]
encode and decode circuits to reliably send messages over many uses of a noisy channel.
For every quantum channel $T$ and every $eps>0$ there exists a threshold $p(epsilon,T)$ for the gate error probability below which rates larger than $C-epsilon$ are fault-tolerantly achievable.
Our results are relevant in communication over large distances, and also on-chip, where distant parts of a quantum computer might need to communicate under higher levels of noise.
arXiv Detail & Related papers (2020-09-15T15:10:50Z) - Measurement-device-independent QSDC protocol using Bell and GHZ states
on quantum simulator [0.0]
Quantum Secure Direct Communication (QSDC) protocol eliminates the necessity of key, encryption and ciphertext transmission.
It is a unique quantum communication scheme where secret information is transmitted directly over a quantum communication channel.
We make use of measurement-device-independent (MDI) protocol in this scheme where all the measurements of quantum states during communication are performed by a third party.
arXiv Detail & Related papers (2020-07-01T07:47:59Z) - High key rate quantum conference key agreement with unconditional
security [13.32599647155171]
Quantum conference key agreement (CKA) is an important cryptographic primitive of quantum cryptography.
We propose a quantum CKA protocol of three users with information-theoretic security.
Our scheme can be widely implemented in the approaching large-scale quantum network.
arXiv Detail & Related papers (2020-06-18T01:47:17Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.