CAPTCHA-Based Secret-Key Sharing Using Quantum Communication

2021 ◽  
Vol 23 (6) ◽  
pp. 46-51
Author(s):  
KyungHyun Han ◽  
Ali Raza ◽  
Seong Oun Hwang
2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Beatrice Da Lio ◽  
Daniele Cozzolino ◽  
Nicola Biagi ◽  
Yunhong Ding ◽  
Karsten Rottwitt ◽  
...  

AbstractQuantum key distribution (QKD) protocols based on high-dimensional quantum states have shown the route to increase the key rate generation while benefiting of enhanced error tolerance, thus overcoming the limitations of two-dimensional QKD protocols. Nonetheless, the reliable transmission through fiber links of high-dimensional quantum states remains an open challenge that must be addressed to boost their application. Here, we demonstrate the reliable transmission over a 2-km-long multicore fiber of path-encoded high-dimensional quantum states. Leveraging on a phase-locked loop system, a stable interferometric detection is guaranteed, allowing for low error rates and the generation of 6.3 Mbit/s of a secret key rate.


2019 ◽  
Vol 34 (01) ◽  
pp. 1950004 ◽  
Author(s):  
Yuhua Sun ◽  
Lili Yan ◽  
Yan Chang ◽  
Shibin Zhang ◽  
Tingting Shao ◽  
...  

Quantum secure direct communication allows one participant to transmit secret messages to another directly without generating a shared secret key first. In most of the existing schemes, quantum secure direct communication can be achieved only when the two participants have full quantum ability. In this paper, we propose two semi-quantum secure direct communication protocols to allow restricted semi-quantum or “classical” users to participate in quantum communication. A semi-quantum user is restricted to measure, prepare, reorder and reflect quantum qubits only in the classical basis [Formula: see text]. Both protocols rely on quantum Alice to randomly prepare Bell states, perform Bell basis measurements and publish the initial Bell states, but the semi-quantum Bob only needs to measure the qubits in classical basis to obtain secret information without quantum memory. Security and qubit efficiency analysis have been given in this paper. The analysis results show that the two protocols can avoid some eavesdropping attacks and their qubit efficiency is higher than some current related quantum or semi-quantum protocols.


2021 ◽  
pp. 2150156
Author(s):  
Tianqi Dou ◽  
Hongwei Liu ◽  
Jipeng Wang ◽  
Zhenhua Li ◽  
Wenxiu Qu ◽  
...  

Quantum communication plays an important role in quantum information science due to its unconditional security. In practical implementations, the users of each communication vary with the transmitted information, and hence not all users are required to participate in each communication round. Therefore, improving the flexibility and efficiency of the actual communication process is highly demanded. Here, we propose a theoretical quantum communication scheme that realizes secret key distribution for both the two-party quantum key distribution (QKD) and multi-party quantum secret sharing (QSS) modes. The sender, Alice, can freely select one or more users to share keys among all users, and nonactive users will not participate in the process of secret key sharing. Numerical simulations show the superiority of the proposed scheme in transmission distance and secure key rate. Consequently, the proposed scheme is valuable for secure quantum communication network scenarios.


2007 ◽  
Vol 17 (03) ◽  
pp. 323-335 ◽  
Author(s):  
NAYA NAGY ◽  
SELIM G. AKL

The aim of quantum key distribution protocols is to establish a secret key among two parties with high security confidence. Such algorithms generally require a quantum channel and an authenticated classical channel. This paper presents a totally new perception of communication in such protocols. The quantum communication alone satisfies all needs of array communication between the two parties. Even so, the quantum communication channel does not need to be protected or authenticated whatsoever. As such, our algorithm is a purely quantum key distribution algorithm. The only certain identification of the two parties is through public keys.


Symmetry ◽  
2020 ◽  
Vol 13 (1) ◽  
pp. 66
Author(s):  
Nur Ziadah Harun ◽  
Zuriati Ahmad Zukarnain ◽  
Zurina Mohd Hanapi ◽  
Idawaty Ahmad ◽  
Majed F. Khodr

Multiphoton Quantum Key Distribution (QKD) has recently been proposed to exchange the secret keys using the rotational of polarization over a multi-stage protocol. It has the ability to outperform the weaknesses of a single photon QKD by improving the generation of key rate and distance range. This paper investigates the theoretical aspects of multiphoton QKD protocol’s performance over free space optic (FSO) networks. The most common setup for quantum communication is the single-beam approach. However, the single-beam setup has limitations in terms of high geometrical loss. In this paper, the symmetry multiple-beam for quantum communication which is called as Multiphoton Quantum Communication-Multiple Beam (MQC-MB) is proposed to transmit the multiphoton from the sender to the receiver in order to minimize the impact of geometrical loss that is faced by the single-beam setup. The analysis was carried out through mathematical analysis by establishing the FSO quantum model with the effects of atmospheric and geometrical loss as well as considering atmospheric turbulence modeled by log-normal distribution. The design criteria of FSO, such as the transmitter, receiver, beam divergence, and diameter of apertures, are analytically investigated. The numerical results demonstrate that the MQC-MB outperforms the single-beam in terms of reducing channel loss by about 8 dB and works well under strong turbulence channel. Furthermore, the MQC-MB reduces the quantum bit error rate (QBER) and improves the secret key rate (SKR) as compared to the single-beam system even though the distance between the sender and receiver increases.


Nanophotonics ◽  
2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Mujtaba Zahidy ◽  
Yaoxin Liu ◽  
Daniele Cozzolino ◽  
Yunhong Ding ◽  
Toshio Morioka ◽  
...  

Abstract Light carrying orbital angular momentum constitutes an important resource for both classical and quantum information technologies. Its inherently unbounded nature can be exploited to generate high-dimensional quantum states or for channel multiplexing in classical and quantum communication in order to significantly boost the data capacity and the secret key rate, respectively. While the big potentials of light owning orbital angular momentum have been widely ascertained, its technological deployment is still limited by the difficulties deriving from the fabrication of integrated and scalable photonic devices able to generate and manipulate it. Here, we present a photonic integrated chip able to excite orbital angular momentum modes in an 800 m long ring-core fiber, allowing us to perform parallel quantum key distribution using two and three different modes simultaneously. The experiment sets the first steps towards quantum orbital angular momentum division multiplexing enabled by a compact and light-weight silicon chip, and further pushes the development of integrated scalable devices supporting orbital angular momentum modes.


Quantum ◽  
2021 ◽  
Vol 5 ◽  
pp. 397
Author(s):  
Paul Hilaire ◽  
Edwin Barnes ◽  
Sophia E. Economou

Quantum communication technologies show great promise for applications ranging from the secure transmission of secret messages to distributed quantum computing. Due to fiber losses, long-distance quantum communication requires the use of quantum repeaters, for which there exist quantum memory-based schemes and all-photonic schemes. While all-photonic approaches based on graph states generated from linear optics avoid coherence time issues associated with memories, they outperform repeater-less protocols only at the expense of a prohibitively large overhead in resources. Here, we consider using matter qubits to produce the photonic graph states and analyze in detail the trade-off between resources and performance, as characterized by the achievable secret key rate per matter qubit. We show that fast two-qubit entangling gates between matter qubits and high photon collection and detection efficiencies are the main ingredients needed for the all-photonic protocol to outperform both repeater-less and memory-based schemes.


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


Sign in / Sign up

Export Citation Format

Share Document