Skip to main content
Top

2018 | Supplement | Chapter

Simulation Study of Single Quantum Channel BB84 Quantum Key Distribution

Authors : Oi-Mean Foong, Tang Jung Low, Kah Wing Hong

Published in: IT Convergence and Security 2017

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the increasing information being shared online, the vast potential for cybercrime is a serious issue for individuals and businesses. Quantum key distribution (QKD) provides a way for distribution of secure key between two communicating parties. However, the current Quantum Key Distribution method, BB84 protocol, is prone to several weaknesses. These are Photon-Number-Splitting (PNS) attack, high Quantum Bit Error Rate (QBER), and low raw key efficiency. Thus, the objectives of this paper are to investigate the impacts of BB84 protocol towards QBER and raw key efficiencies in single quantum channel. Experiments were set up using a QKD simulator that was developed in Java NetBeans. The simulation study has reaffirmed the results of QBER and raw key efficiencies for the single quantum channel BB84 protocol.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Aaronson, S.: The limits of quantum computers. Sci. Am. 298, 62–69 (2008)CrossRef Aaronson, S.: The limits of quantum computers. Sci. Am. 298, 62–69 (2008)CrossRef
2.
go back to reference Gambetta, J.M., Chow, J.M., Steffen, M.: Building logical qubits in a superconducting quantum computing system. npj Quantum Inf. 3(2), 1–7 (2017) Gambetta, J.M., Chow, J.M., Steffen, M.: Building logical qubits in a superconducting quantum computing system. npj Quantum Inf. 3(2), 1–7 (2017)
3.
go back to reference Barreno, M.A.: The future of cryptography under quantum computers. Dartmouth College Computer Science Technical Reports (2002) Barreno, M.A.: The future of cryptography under quantum computers. Dartmouth College Computer Science Technical Reports (2002)
4.
go back to reference Murugesan, S., Colwell, B.: Next-generation computing paradigms. Computer 49, 14–20 (2016)CrossRef Murugesan, S., Colwell, B.: Next-generation computing paradigms. Computer 49, 14–20 (2016)CrossRef
5.
go back to reference Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin toss-ing. Theor. Comput. Sci. 560, 7–11 (2014)CrossRefMATH Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin toss-ing. Theor. Comput. Sci. 560, 7–11 (2014)CrossRefMATH
7.
go back to reference Brassard, G., Lütkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)CrossRefMATH Brassard, G., Lütkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)CrossRefMATH
8.
go back to reference Jin, D., Verma, P.K., Kartalopoulos, S.V.: Fast convergent key distribution algorithms using a dual quantum channel. Secur. Commun. Netw. 2, 519–530 (2009) Jin, D., Verma, P.K., Kartalopoulos, S.V.: Fast convergent key distribution algorithms using a dual quantum channel. Secur. Commun. Netw. 2, 519–530 (2009)
9.
go back to reference Gao, J., Zhu, C., Xiao, H.: Efficient quantum key distribution scheme with pre-announcing the basis. EPL (Europhys. Lett.) 105, 60003 (2014)CrossRef Gao, J., Zhu, C., Xiao, H.: Efficient quantum key distribution scheme with pre-announcing the basis. EPL (Europhys. Lett.) 105, 60003 (2014)CrossRef
10.
go back to reference Basu, S., Sengupta, S.: Modified BB84 protocol using CCD technology. J. Quantum Inf. Sci. 6, 31 (2016)CrossRef Basu, S., Sengupta, S.: Modified BB84 protocol using CCD technology. J. Quantum Inf. Sci. 6, 31 (2016)CrossRef
12.
go back to reference Rodney, V.M., Simon, J.D.: The path to scalable distributed quantum computing. Computer 49(9), 31–42 (2016) CrossRef Rodney, V.M., Simon, J.D.: The path to scalable distributed quantum computing. Computer 49(9), 31–42 (2016) CrossRef
13.
go back to reference Oraevsky, A.N.: On quantum computers. Quantum Electron. 30(5), 457–458 (2000)CrossRef Oraevsky, A.N.: On quantum computers. Quantum Electron. 30(5), 457–458 (2000)CrossRef
14.
go back to reference Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802–803 (1982)CrossRefMATH Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802–803 (1982)CrossRefMATH
15.
go back to reference Heisenberg, W.: Physics and Philosophy. Prometheus Books, New York (1999) Heisenberg, W.: Physics and Philosophy. Prometheus Books, New York (1999)
16.
17.
go back to reference Li, H.-W., Yin, Z.-Q., Wang, S., Qian, Y.-J., Chen, W., Guo, G.-C., Han, Z.-F.: Random-ness determines practical security of BB84 quantum key distribution. Sci. Rep. 5, 16200 (2015)CrossRef Li, H.-W., Yin, Z.-Q., Wang, S., Qian, Y.-J., Chen, W., Guo, G.-C., Han, Z.-F.: Random-ness determines practical security of BB84 quantum key distribution. Sci. Rep. 5, 16200 (2015)CrossRef
18.
go back to reference Mogos, G.: Quantum key distribution protocol with four-state systems-software imple-mentation. Proc. Comput. Sci. 54, 65–72 (2015)CrossRef Mogos, G.: Quantum key distribution protocol with four-state systems-software imple-mentation. Proc. Comput. Sci. 54, 65–72 (2015)CrossRef
19.
go back to reference Senekane, M., Mafu, M., Petruccione, F.: Six-state symmetric quantum key distribution protocol. J. Quantum Inf. Sci. 5, 33 (2015)CrossRef Senekane, M., Mafu, M., Petruccione, F.: Six-state symmetric quantum key distribution protocol. J. Quantum Inf. Sci. 5, 33 (2015)CrossRef
20.
go back to reference Mafu, M.: A simple security proof for entanglement-based quantum key distribution. J. Quantum Inf. Sci. 6, 296 (2016)CrossRef Mafu, M.: A simple security proof for entanglement-based quantum key distribution. J. Quantum Inf. Sci. 6, 296 (2016)CrossRef
21.
go back to reference Benletaief, N., Rezig, H., Bouallegue, A.: Toward efficient quantum key distribution reconciliation. J. Quantum Inf. Sci. 4, 117 (2014)CrossRef Benletaief, N., Rezig, H., Bouallegue, A.: Toward efficient quantum key distribution reconciliation. J. Quantum Inf. Sci. 4, 117 (2014)CrossRef
22.
go back to reference Elboukhari, M., Azizi, M., Azizi, A.: Quantum key distribution protocols: a survey. Int. J. Univ. Comput. Sci. 1, 59–67 (2010)MATH Elboukhari, M., Azizi, M., Azizi, A.: Quantum key distribution protocols: a survey. Int. J. Univ. Comput. Sci. 1, 59–67 (2010)MATH
23.
go back to reference Erven, C., Ma, X., Laflamme, R., Weihs, G.: Entangled quantum key distribution with a biased basis choice. New J. Phys. 11, 045025 (2009)MathSciNetCrossRef Erven, C., Ma, X., Laflamme, R., Weihs, G.: Entangled quantum key distribution with a biased basis choice. New J. Phys. 11, 045025 (2009)MathSciNetCrossRef
24.
go back to reference Lo, H.-K., Chau, H.F., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18, 133–165 (2005)MathSciNetCrossRefMATH Lo, H.-K., Chau, H.F., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18, 133–165 (2005)MathSciNetCrossRefMATH
Metadata
Title
Simulation Study of Single Quantum Channel BB84 Quantum Key Distribution
Authors
Oi-Mean Foong
Tang Jung Low
Kah Wing Hong
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-6454-8_21

Premium Partner