Skip to main content
Top
Published in: Quantum Information Processing 11/2020

01-11-2020

Experimental realization of three quantum key distribution protocols

Authors: Aakash Warke, Bikash K. Behera, Prasanta K. Panigrahi

Published in: Quantum Information Processing | Issue 11/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Classical computers allow security of cryptographic protocols based on the mathematical complexity of encoding functions and the shared key. This implies that high computational power can have a positive outcome in breaking cryptographic protocols that employ classical computers. Quantum machines claim to possess such power. Two parties interested in communicating with each other take up the process of measuring entangled states in order to construct a secret key which is safeguarded against an eavesdropper capable of performing quantum operations. At first, experimental verification of the BB84 protocol using three bases has been performed in this paper, out of which sub-cases have been considered based on whether or not Eve has attempted an attack. The following part includes experimental realization of the B92 protocol which was introduced by Charles Bennett in the year 1992. Possibility of an Eve’s attack is considered and implemented. Succeeding part relies on experimental implementation of the protocol that was introduced by Acin, Massar and Pironio in the year 2006 (New J Phys 8:126, 2006). All the implementations have been done using the IBM Quantum Experience platform.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
2.
go back to reference Pathak, A.: Elements of Quantum Computation and Quantum Communication. CRC Press, Boca Raton (2018)MATH Pathak, A.: Elements of Quantum Computation and Quantum Communication. CRC Press, Boca Raton (2018)MATH
3.
go back to reference Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. IEEE Int. Conf. Comput. Syst. Signal Process. 175, 8 (1984)MATH Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. IEEE Int. Conf. Comput. Syst. Signal Process. 175, 8 (1984)MATH
4.
go back to reference Bennett, C.H., Charles, H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560(Part 1), 7–11 (2014)MathSciNetCrossRef Bennett, C.H., Charles, H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560(Part 1), 7–11 (2014)MathSciNetCrossRef
7.
go back to reference Fan, H., Wang, Y., Jing, L., Yue, J., Shi, H., Zhang, Y., Mu, L.: Quantum cloning machines and the applications. Phys. Rep. 544, 241–322 (2014)ADSMathSciNetCrossRef Fan, H., Wang, Y., Jing, L., Yue, J., Shi, H., Zhang, Y., Mu, L.: Quantum cloning machines and the applications. Phys. Rep. 544, 241–322 (2014)ADSMathSciNetCrossRef
8.
go back to reference Fröhlich, B., Lucamarini, M., Dynes, J., Comandar, L., Tam, W., Plews, A., Sharpe, A., Yuan, Z., Shields, A.: Long-distance quantum key distribution secure against coherent attacks. Optica 4(1), 163–167 (2017)ADSCrossRef Fröhlich, B., Lucamarini, M., Dynes, J., Comandar, L., Tam, W., Plews, A., Sharpe, A., Yuan, Z., Shields, A.: Long-distance quantum key distribution secure against coherent attacks. Optica 4(1), 163–167 (2017)ADSCrossRef
9.
go back to reference Ferenczi, A., Narasimhachar, V., Lütkenhaus, N.: Security proof of the unbalanced phase-encoded Bennett-Brassard 1984 protocol. Phys. Rev. A 86, 042327 (2012)ADSCrossRef Ferenczi, A., Narasimhachar, V., Lütkenhaus, N.: Security proof of the unbalanced phase-encoded Bennett-Brassard 1984 protocol. Phys. Rev. A 86, 042327 (2012)ADSCrossRef
10.
go back to reference Bennett, C.H., et al.: Experimental quantum cryptography. J. Cryptol. 5, 3–28 (1992)CrossRef Bennett, C.H., et al.: Experimental quantum cryptography. J. Cryptol. 5, 3–28 (1992)CrossRef
11.
go back to reference Minder, M., et al.: Experimental quantum key distribution beyond the repeaterless secret key capacity. Nat. Photonics 13, 334–338 (2019)ADSCrossRef Minder, M., et al.: Experimental quantum key distribution beyond the repeaterless secret key capacity. Nat. Photonics 13, 334–338 (2019)ADSCrossRef
12.
go back to reference Dhoha, AL-M., et al.: Quantum cryptography on IBM QX. IEEE Xplore, 18851058 (2013) Dhoha, AL-M., et al.: Quantum cryptography on IBM QX. IEEE Xplore, 18851058 (2013)
13.
go back to reference Acin, A., Massar, S., Pirono, S.: Efficient quantum key distribution secure against no-signalling eavesdroppers. New J. Phys. 8, 126 (2006)ADSCrossRef Acin, A., Massar, S., Pirono, S.: Efficient quantum key distribution secure against no-signalling eavesdroppers. New J. Phys. 8, 126 (2006)ADSCrossRef
14.
go back to reference Bouwmeester, D., Ekert, A., Zeilinger, A.: Lecture 12: quantum key distribution. Phys. Quantum Inf. Bouwmeester, D., Ekert, A., Zeilinger, A.: Lecture 12: quantum key distribution. Phys. Quantum Inf.
15.
go back to reference Nielson, M., Chuang, I.: Quantum Computing and Quantum Information. Cambridge University Press, Cambridge (2000) Nielson, M., Chuang, I.: Quantum Computing and Quantum Information. Cambridge University Press, Cambridge (2000)
16.
18.
go back to reference Clauser, J.F., Horne, M.A., Shimony, A., Holt, R.A.: Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23(15), 880–4 (1969)ADSCrossRef Clauser, J.F., Horne, M.A., Shimony, A., Holt, R.A.: Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23(15), 880–4 (1969)ADSCrossRef
19.
go back to reference AL-Mubayedh, D., AL-Khalis, M., AL-Azman, G., AL-Abdali, M., AlFosail, M., Nagy, N.: Quantum cryptography on IBM QX. In: International Conference on Computer Applications & Information Security (2019) AL-Mubayedh, D., AL-Khalis, M., AL-Azman, G., AL-Abdali, M., AlFosail, M., Nagy, N.: Quantum cryptography on IBM QX. In: International Conference on Computer Applications & Information Security (2019)
20.
21.
go back to reference Garcia-Martin, D., Sierra, G.: Five experimental tests on the 5-qubit IBM quantum computer. J. Appl. Math. Phys. 6(7), 1460–1475 (2018)CrossRef Garcia-Martin, D., Sierra, G.: Five experimental tests on the 5-qubit IBM quantum computer. J. Appl. Math. Phys. 6(7), 1460–1475 (2018)CrossRef
Metadata
Title
Experimental realization of three quantum key distribution protocols
Authors
Aakash Warke
Bikash K. Behera
Prasanta K. Panigrahi
Publication date
01-11-2020
Publisher
Springer US
Published in
Quantum Information Processing / Issue 11/2020
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-020-02914-z

Other articles of this Issue 11/2020

Quantum Information Processing 11/2020 Go to the issue