scholarly journals Modeling and simulation of quantum information, quantum communication, and quantum key distribution (QKD) systems

Author(s):  
Michael R Grimaila
2021 ◽  
pp. 2150156
Author(s):  
Tianqi Dou ◽  
Hongwei Liu ◽  
Jipeng Wang ◽  
Zhenhua Li ◽  
Wenxiu Qu ◽  
...  

Quantum communication plays an important role in quantum information science due to its unconditional security. In practical implementations, the users of each communication vary with the transmitted information, and hence not all users are required to participate in each communication round. Therefore, improving the flexibility and efficiency of the actual communication process is highly demanded. Here, we propose a theoretical quantum communication scheme that realizes secret key distribution for both the two-party quantum key distribution (QKD) and multi-party quantum secret sharing (QSS) modes. The sender, Alice, can freely select one or more users to share keys among all users, and nonactive users will not participate in the process of secret key sharing. Numerical simulations show the superiority of the proposed scheme in transmission distance and secure key rate. Consequently, the proposed scheme is valuable for secure quantum communication network scenarios.


Author(s):  
Stephen Barnett

The practical implementation of quantum information technologies requires, for the most part, highly advanced and currently experimental procedures. One exception is quantum cryptography, or quantum key distribution, which has been successfully demonstrated in many laboratories and has reached an advanced level of development. It will probably become the first commercial application of quantum information. In quantum key distribution, Alice and Bob exploit a quantum channel to create a secret shared key comprising a random string of binary digits. This key can then be used to protect a subsequent communication between them. The principal idea is that the secrecy of the key distribution is ensured by the laws of quantum physics. Proving security for practical communication systems is a challenging problem and requires techniques that are beyond the scope of this book. At a fundamental level, however, the ideas are simple and may readily be understood with the knowledge we have already acquired. Quantum cryptography is the latest idea in the long history of secure (and not so secure) communications and, if it is to develop, it will have to compete with existing technologies. For this reason we begin with a brief survey of the history and current state of the art in secure communications before turning to the possibilities offered by quantum communications. The history of cryptography is a long and fascinating one. As a consequence of the success or, more spectacularly, the failure of ciphers, wars have been fought, battles decided, kingdoms won, and heads lost. In the information age, ciphers and cryptosystems have become part of everyday life; we use them to protect our computers, to shop over the Internet, and to access our money via an ATM (automated teller machine). One of the oldest and simplest of all ciphers is the transposition or Caesarean cipher (attributed to Julius Caesar), in which the letters are shifted by a known (and secret) number of places in the alphabet. If the shift is 1, for example, then A is enciphered as B, B→C, · · ·, Y→Z, Z→A. A shift of five places leads us to make the replacements A→F, B→G, · · ·, Y→D, Z→E.


2019 ◽  
Vol 9 (10) ◽  
pp. 2081 ◽  
Author(s):  
Hua Wang ◽  
Yongli Zhao ◽  
Avishek Nag

As an important support for quantum communication, quantum key distribution (QKD) networks have achieved a relatively mature level of development, and they face higher requirements for multi-user end-to-end networking capabilities. Thus, QKD networks need an effective management plane to control and coordinate with the QKD resources. As a promising technology, software defined networking (SDN) can separate the control and management of QKD networks from the actual forwarding of the quantum keys. This paper systematically introduces QKD networks enabled by SDN, by elaborating on its overall architecture, related interfaces, and protocols. Then, three-use cases are provided as important paradigms with their corresponding schemes and simulation performances.


Author(s):  
Jonathan C Denton ◽  
Douglas D Hodson ◽  
Richard G Cobb ◽  
Logan O Mailloux ◽  
Michael R Grimaila ◽  
...  

This work presents a model to estimate the performance of space-based, optical-based, quantum communication protocols. This model consists of components to account for optical channel propagation effects based on orbit selection and atmospheric conditions. The model presented is general purpose and can be leveraged to evaluate the performance of a variety of quantum communication protocols, of which, Quantum Key Distribution (QKD) systems served as our motivating use case of particular interest. To verify correctness, the model is used to produce estimates for QKD system scenarios and compared to published results. The performance of QKD systems is of interest as distance limitations for terrestrial-based systems have hindered their practical use, and satellite-based designs that can generate a shared key between two distant geographic locations have been proposed. For this application domain, a review of space-based designs that illuminate the need for a free space downlink channel model is presented followed by its development to estimate the performance of quantum exchanges between a satellite and ground site.


Author(s):  
Seid Koudia ◽  
Abdelhakim Gharbi

Quantum non-Gaussian states are considered a useful resource for many tasks in quantum information processing, from quantum metrology and quantum sensing to quantum communication and quantum key distribution. Another useful tool that is gaining attention is the newly constructed quantum switch. Its applications in many tasks in quantum information have been proved to outperform many existing schemes in quantum communication and quantum thermometry. In this contribution, we demonstrate this to be very useful for engineering highly non-Gaussian states from Gaussian operations whose order is controlled by degrees of freedom of a control qubit. The nonconvexity of the set of Gaussian states and the set of Gaussian operations guarantees the emergence of non-Gaussianity after post-selection on the control qubit deterministically, in contrast to existing protocols in the literature. The nonclassicality of the resulting states is discussed accordingly.


2012 ◽  
Vol 2012 ◽  
pp. 1-10 ◽  
Author(s):  
Octavian Dănilă ◽  
Paul E. Sterian ◽  
Andreea Rodica Sterian

Entanglement between two quantum elements is a phenomenon which presents a broad application spectrum, being used largely in quantum cryptography schemes and in physical characterisation of the universe. Commonly known entangled states have been obtained with photons and electrons, but other quantum elements such as quarks, leptons, and neutrinos have shown their informational potential. In this paper, we present the perspective of exploiting the phenomenon of entanglement that appears in nuclear particle interactions as a resource for quantum key distribution protocols.


2018 ◽  
Vol 16 (07) ◽  
pp. 1850055 ◽  
Author(s):  
Linda Anticoli ◽  
Masoud Gharahi Ghahi

The notion of entanglement is the most well-known nonclassical correlation in quantum mechanics, and a fundamental resource in quantum information and computation. This correlation, which is displayed by certain classes of quantum states, is of utmost importance when dealing with protocols, such as quantum teleportation, cryptography and quantum key distribution. In this paper, we exploit a classification of tripartite entanglement by introducing the concepts of entangled hypergraph and evolving entangled hypergraph as data structures suitable to model quantum protocols which use entanglement. Finally, we present a few examples to provide applications of this model.


2007 ◽  
Vol 17 (03) ◽  
pp. 323-335 ◽  
Author(s):  
NAYA NAGY ◽  
SELIM G. AKL

The aim of quantum key distribution protocols is to establish a secret key among two parties with high security confidence. Such algorithms generally require a quantum channel and an authenticated classical channel. This paper presents a totally new perception of communication in such protocols. The quantum communication alone satisfies all needs of array communication between the two parties. Even so, the quantum communication channel does not need to be protected or authenticated whatsoever. As such, our algorithm is a purely quantum key distribution algorithm. The only certain identification of the two parties is through public keys.


Entropy ◽  
2019 ◽  
Vol 21 (5) ◽  
pp. 518 ◽  
Author(s):  
Bin Liu ◽  
Zhifeng Gao ◽  
Di Xiao ◽  
Wei Huang ◽  
Zhiqing Zhang ◽  
...  

In this paper, a quantum identity authentication protocol is presented based on the counterfactual quantum key distribution system. Utilizing the proposed protocol, two participants can verify each other’s identity through the counterfactual quantum communication system. The security of the protocol is proved against individual attacks. Furthermore, according to the characteristics of the counterfactual quantum key distribution system, we propose an authenticated counterfactual quantum key distribution protocol based on a novel strategy of mixing the two types of quantum cryptographic protocols randomly. The authenticated quantum key distribution can also be used to update the extent of the authentication keys.


Sign in / Sign up

Export Citation Format

Share Document