scholarly journals Security and Communication Distance Improvement in Decoy States Based Quantum Key Distribution Using Pseudo-Random Bases Choice for Photon Polarization Measurement

Author(s):  
Martin TCHOFFO ◽  
Alain Giresse TENE

Abstract This paper proposes a new quantum key distribution(QKD) protocol, namely the pseudo-random bases entangled photon based QKD (PRB-EPQKD) protocol. The latest mainly focuses on three properties, including the security of the protocol, the secure key size and the maximum communication distance between legitimate communication users (Alice and Bob). To achieve this, we first consider a spontaneous-parametric-down (SPDC) photon source located in a low-earth-orbit (LEO) type satellite capable of producing and distributing entangled photons pairs to Alice and Bob. Secondly, we assume that Alice's and Bob's photons state measurement bases are identically generated via a pseudo-random number generator (PRNG), namely the quantum logistic map (QLM). Finally, we also assume that in addition to their photons states, Alice and Bob intentionally share a set of decoy states at each pulse with randomly selected intensity, and with the goal to detect the presence of the eavesdropper (Eve). Under these considerations, the secure key rate upper bound is evaluated applying the Gottesman-Lo-Lutkenhaus-Preskill's (GLLP) formula, for two different implementations, namely the non-decoy states and the infinite active decoy states based QKD. It is observed a significant improvement in the secure key size and the communication distance as well, compared to existing protocols, since we realize that under daylight, downlinks satellite conditions, a kindly selected light source, and good crystal's properties, the maximum communication distance can reach up to 70000 km. In addition, using the combined type-I and type-II SPDC photons source as our entangled photons pairs generator, significantly improved the photon mean number and render our protocol more robust against photon number division attack and against attenuation-induced atmospheric propagation. Furthermore, the protocol is more secure as compared to existing ones, given that any eavesdropper must crack simultaneously the chaotic system used as PRNG and the QKD system, before getting any useful information as regards to the measurement bases used by Alice and Bob, and thus the secure key.

2016 ◽  
Vol 14 (02) ◽  
pp. 1630002
Author(s):  
Monika Jacak ◽  
Janusz Jacak ◽  
Piotr Jóźwiak ◽  
Ireneusz Jóźwiak

The overview of the current status of quantum cryptography is given in regard to quantum key distribution (QKD) protocols, implemented both on nonentangled and entangled flying qubits. Two commercial R&D platforms of QKD systems are described (the Clavis II platform by idQuantique implemented on nonentangled photons and the EPR S405 Quelle platform by AIT based on entangled photons) and tested for feasibility of their usage in commercial TELECOM fiber metropolitan networks. The comparison of systems efficiency, stability and resistivity against noise and hacker attacks is given with some suggestion toward system improvement, along with assessment of two models of QKD.


2005 ◽  
Vol 5 (3) ◽  
pp. 181-186
Author(s):  
Th. Beth ◽  
J. Muller-Quade ◽  
R. Steinwandt

Recently, a quantum key exchange protocol has been described\cite{PFLM04}, which served as basis for securing an actual bank transaction by means of quantum cryptography \cite{ZVS04}. The authentication scheme used to this aim has been proposed by Peev et al. \cite{PML04}. Here we show, that this authentication is insecure in the sense that an attacker can provoke a situation where initiator and responder of a key exchange end up with different keys. Moreover, it may happen that an attacker can decrypt a part of the plaintext protected with the derived encryption key.


2019 ◽  
Vol 34 (04) ◽  
pp. 2050063
Author(s):  
Yefeng He ◽  
Wenping Ma

With heralded pair coherent states (HPCS), orbital angular momentum (OAM) states and pulse position modulation (PPM) technology, a decoy-state measurement-device-independent quantum key distribution (MDI-QKD) protocol is proposed. OAM states and PPM technology are used to realize the coding of the signal states in the HPCS light source. The use of HPCS light source, OAM coding and PPM coding cannot only reduce the error rate but also improve the key generation rate and communication distance. The new MDI-QKD protocol also employs three-intensity decoy states to avoid the attacks against the light source. By calculating the error rate and key generation rate, the performance of the MDI-QKD protocol is analyzed. Numerical simulation shows that the protocol has very low error rate and very high key generation rate. Moreover, the maximum communication distance can reach 455 km.


2015 ◽  
Vol 91 (3) ◽  
Author(s):  
Shihan Sajeed ◽  
Igor Radchenko ◽  
Sarah Kaiser ◽  
Jean-Philippe Bourgoin ◽  
Anna Pappa ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document