quantum key distribution protocol
Recently Published Documents


TOTAL DOCUMENTS

209
(FIVE YEARS 71)

H-INDEX

21
(FIVE YEARS 5)

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Chia-Wei Tsai ◽  
Chun-Wei Yang

AbstractThe mediated semi-quantum key distribution (MSQKD) protocol is an important research issue that lets two classical participants share secret keys securely between each other with the help of a third party (TP). However, in the existing MSQKD protocols, there are two improvable issues, namely (1) the classical participants must be equipped with expensive detectors to avoid Trojan horse attacks and (2) the trustworthiness level of TP must be honest. To the best of our knowledge, none of the existing MSQKD protocols can resolve both these issues. Therefore, this study takes Bell states as the quantum resource to propose a MSQKD protocol, in which the classical participants do not need a Trojan horse detector and the TP is dishonest. Furthermore, the proposed protocol is shown to be secure against well-known attacks and the classical participants only need two quantum capabilities. Therefore, in comparison to the existing MSQKD protocols, the proposed protocol is better practical.


2021 ◽  
Vol 18 (12) ◽  
pp. 125205
Author(s):  
S N Molotkov

Abstract Quantum key distribution (QKD) systems are open systems. Thus, an eavesdropper can actively influence the elements of the system through the communication line, altering their regular operation. One known attack is an attack with detector blinding. With such an attack, the eavesdropper can obtain the entire key and remain undetectable. The paper proposes a fundamentally new method of detecting and protecting quantum cryptography systems with phase coding against the attack with avalanche detector blinding. The proposed method is based on diverting a part of the input signal in the receiving terminal to bypass the interferometer and deliver it to the same avalanche detectors. Measuring the detector response in different time windows, both for the bypassed signal and the normal operation range, one can effectively identify the ongoing detector blinding attack. The method does not require radical changes in existing quantum cryptography systems and is quite universal, since it can be used for any phase-coded quantum key distribution protocol. The method provides a fundamental strategy of detecting and protecting against the attack at the level of the quantum key distribution protocol, and not at the level of technical ‘patches’.


2021 ◽  
Vol 2095 (1) ◽  
pp. 012080
Author(s):  
Z. Wang ◽  
Z. Guo ◽  
G. Mogos ◽  
Z. Gao

Abstract A cryptographic communication system is secure from a practical point of view if the encryption scheme can be broken after X years, where X is determined by security needs and existing technology. Quantum cryptography does not offer a complete solution for all cryptographic problems: secure keys, encryption algorithms based on them, message authentication and finding ways to detect/prevent interception; but it can be seen as a complement to standard symmetric cryptographic systems. This paper presents the implementation of the BB84 quantum key distribution protocol on mobile systems - Amov-lab’s Z410 drone with T-engine 2216 - and tracks the error rate obtained in flight conditions.


2021 ◽  
Vol 2056 (1) ◽  
pp. 012011
Author(s):  
Chan Myae Hein ◽  
T F Kamalov

Abstract A new eavesdropping strategy is proposed for the Quantum Key Distribution (QKD) protocol. This scheme represents a new kind of intercept/resend strategy based on Bell’s theorem. Quantum key distribution (QKD) provides the foremost reliable form of secure key exchange, using only the input-output statistics of the devices to realize information-theoretic security. In this paper, we present an improved QKD protocol that can simultaneously distribute the quantum secret key. We are already using the QKD protocol with simulated results matched completely with the theoretical concepts.


Sign in / Sign up

Export Citation Format

Share Document