Skip to main content

2018 | Supplement | Buchkapitel

Simulation Study of Single Quantum Channel BB84 Quantum Key Distribution

verfasst von : Oi-Mean Foong, Tang Jung Low, Kah Wing Hong

Erschienen in: IT Convergence and Security 2017

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the increasing information being shared online, the vast potential for cybercrime is a serious issue for individuals and businesses. Quantum key distribution (QKD) provides a way for distribution of secure key between two communicating parties. However, the current Quantum Key Distribution method, BB84 protocol, is prone to several weaknesses. These are Photon-Number-Splitting (PNS) attack, high Quantum Bit Error Rate (QBER), and low raw key efficiency. Thus, the objectives of this paper are to investigate the impacts of BB84 protocol towards QBER and raw key efficiencies in single quantum channel. Experiments were set up using a QKD simulator that was developed in Java NetBeans. The simulation study has reaffirmed the results of QBER and raw key efficiencies for the single quantum channel BB84 protocol.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aaronson, S.: The limits of quantum computers. Sci. Am. 298, 62–69 (2008)CrossRef Aaronson, S.: The limits of quantum computers. Sci. Am. 298, 62–69 (2008)CrossRef
2.
Zurück zum Zitat Gambetta, J.M., Chow, J.M., Steffen, M.: Building logical qubits in a superconducting quantum computing system. npj Quantum Inf. 3(2), 1–7 (2017) Gambetta, J.M., Chow, J.M., Steffen, M.: Building logical qubits in a superconducting quantum computing system. npj Quantum Inf. 3(2), 1–7 (2017)
3.
Zurück zum Zitat Barreno, M.A.: The future of cryptography under quantum computers. Dartmouth College Computer Science Technical Reports (2002) Barreno, M.A.: The future of cryptography under quantum computers. Dartmouth College Computer Science Technical Reports (2002)
4.
Zurück zum Zitat Murugesan, S., Colwell, B.: Next-generation computing paradigms. Computer 49, 14–20 (2016)CrossRef Murugesan, S., Colwell, B.: Next-generation computing paradigms. Computer 49, 14–20 (2016)CrossRef
5.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin toss-ing. Theor. Comput. Sci. 560, 7–11 (2014)CrossRefMATH Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin toss-ing. Theor. Comput. Sci. 560, 7–11 (2014)CrossRefMATH
7.
Zurück zum Zitat Brassard, G., Lütkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)CrossRefMATH Brassard, G., Lütkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)CrossRefMATH
8.
Zurück zum Zitat Jin, D., Verma, P.K., Kartalopoulos, S.V.: Fast convergent key distribution algorithms using a dual quantum channel. Secur. Commun. Netw. 2, 519–530 (2009) Jin, D., Verma, P.K., Kartalopoulos, S.V.: Fast convergent key distribution algorithms using a dual quantum channel. Secur. Commun. Netw. 2, 519–530 (2009)
9.
Zurück zum Zitat Gao, J., Zhu, C., Xiao, H.: Efficient quantum key distribution scheme with pre-announcing the basis. EPL (Europhys. Lett.) 105, 60003 (2014)CrossRef Gao, J., Zhu, C., Xiao, H.: Efficient quantum key distribution scheme with pre-announcing the basis. EPL (Europhys. Lett.) 105, 60003 (2014)CrossRef
10.
Zurück zum Zitat Basu, S., Sengupta, S.: Modified BB84 protocol using CCD technology. J. Quantum Inf. Sci. 6, 31 (2016)CrossRef Basu, S., Sengupta, S.: Modified BB84 protocol using CCD technology. J. Quantum Inf. Sci. 6, 31 (2016)CrossRef
11.
12.
Zurück zum Zitat Rodney, V.M., Simon, J.D.: The path to scalable distributed quantum computing. Computer 49(9), 31–42 (2016) CrossRef Rodney, V.M., Simon, J.D.: The path to scalable distributed quantum computing. Computer 49(9), 31–42 (2016) CrossRef
13.
Zurück zum Zitat Oraevsky, A.N.: On quantum computers. Quantum Electron. 30(5), 457–458 (2000)CrossRef Oraevsky, A.N.: On quantum computers. Quantum Electron. 30(5), 457–458 (2000)CrossRef
14.
Zurück zum Zitat Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802–803 (1982)CrossRefMATH Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802–803 (1982)CrossRefMATH
15.
Zurück zum Zitat Heisenberg, W.: Physics and Philosophy. Prometheus Books, New York (1999) Heisenberg, W.: Physics and Philosophy. Prometheus Books, New York (1999)
16.
Zurück zum Zitat Wiedemann, D.: Quantum cryptography. ACM SIGACT News 18, 48–51 (1986)CrossRef Wiedemann, D.: Quantum cryptography. ACM SIGACT News 18, 48–51 (1986)CrossRef
17.
Zurück zum Zitat Li, H.-W., Yin, Z.-Q., Wang, S., Qian, Y.-J., Chen, W., Guo, G.-C., Han, Z.-F.: Random-ness determines practical security of BB84 quantum key distribution. Sci. Rep. 5, 16200 (2015)CrossRef Li, H.-W., Yin, Z.-Q., Wang, S., Qian, Y.-J., Chen, W., Guo, G.-C., Han, Z.-F.: Random-ness determines practical security of BB84 quantum key distribution. Sci. Rep. 5, 16200 (2015)CrossRef
18.
Zurück zum Zitat Mogos, G.: Quantum key distribution protocol with four-state systems-software imple-mentation. Proc. Comput. Sci. 54, 65–72 (2015)CrossRef Mogos, G.: Quantum key distribution protocol with four-state systems-software imple-mentation. Proc. Comput. Sci. 54, 65–72 (2015)CrossRef
19.
Zurück zum Zitat Senekane, M., Mafu, M., Petruccione, F.: Six-state symmetric quantum key distribution protocol. J. Quantum Inf. Sci. 5, 33 (2015)CrossRef Senekane, M., Mafu, M., Petruccione, F.: Six-state symmetric quantum key distribution protocol. J. Quantum Inf. Sci. 5, 33 (2015)CrossRef
20.
Zurück zum Zitat Mafu, M.: A simple security proof for entanglement-based quantum key distribution. J. Quantum Inf. Sci. 6, 296 (2016)CrossRef Mafu, M.: A simple security proof for entanglement-based quantum key distribution. J. Quantum Inf. Sci. 6, 296 (2016)CrossRef
21.
Zurück zum Zitat Benletaief, N., Rezig, H., Bouallegue, A.: Toward efficient quantum key distribution reconciliation. J. Quantum Inf. Sci. 4, 117 (2014)CrossRef Benletaief, N., Rezig, H., Bouallegue, A.: Toward efficient quantum key distribution reconciliation. J. Quantum Inf. Sci. 4, 117 (2014)CrossRef
22.
Zurück zum Zitat Elboukhari, M., Azizi, M., Azizi, A.: Quantum key distribution protocols: a survey. Int. J. Univ. Comput. Sci. 1, 59–67 (2010)MATH Elboukhari, M., Azizi, M., Azizi, A.: Quantum key distribution protocols: a survey. Int. J. Univ. Comput. Sci. 1, 59–67 (2010)MATH
23.
Zurück zum Zitat Erven, C., Ma, X., Laflamme, R., Weihs, G.: Entangled quantum key distribution with a biased basis choice. New J. Phys. 11, 045025 (2009)MathSciNetCrossRef Erven, C., Ma, X., Laflamme, R., Weihs, G.: Entangled quantum key distribution with a biased basis choice. New J. Phys. 11, 045025 (2009)MathSciNetCrossRef
24.
Zurück zum Zitat Lo, H.-K., Chau, H.F., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18, 133–165 (2005)MathSciNetCrossRefMATH Lo, H.-K., Chau, H.F., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18, 133–165 (2005)MathSciNetCrossRefMATH
Metadaten
Titel
Simulation Study of Single Quantum Channel BB84 Quantum Key Distribution
verfasst von
Oi-Mean Foong
Tang Jung Low
Kah Wing Hong
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-6454-8_21