Advanced Secure Communication: Exploring Quantum Key Distribution, the BB84 Method
Creators
- 1. Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.
Contributors
Contact person:
Researchers:
- 1. Department of Computer Science and Technology, Yogi Vemana University, Kadapa, India.
- 2. Department of Computer Science, PVKN Government College, Chittoor, India.
Description
Abstract: One promising way to use quantum information to secure everyday communication is through the distribution of quantum keys. By exchanging a secret key, the Quantum Key Distribution (QKD) approach allows two parties to communicate securely.BB84 protocol is among the most well-known QKD protocols. In this protocol, qubits are exchanged via a quantum channel between the sender and the receiver. This enables them to produce a shared key that is impenetrable to eavesdroppers and illustrate the fundamental ideas of QKD using current simulations and implementations. The results of this study demonstrate that the BB84 protocol is a highly secure QKD technique that has been investigated in great detail and used in a variety of contexts. Additionally, over the enhancements made to the BB84 protocol such as the use of advanced error correction techniques and decoy states to increase its security and usability is discussed. With an emphasis on the BB84 protocol in secure communication technologies, this study offers an extensive analysis of QKD systems overall.
Files
D443413040424.pdf
Files
(374.6 kB)
Name | Size | Download all |
---|---|---|
md5:52f76d0a03d1a506346e0901d1d3085a
|
374.6 kB | Preview Download |
Additional details
Identifiers
- DOI
- 10.35940/ijeat.D4434.13040424
- EISSN
- 2249-8958
Dates
- Accepted
-
2024-04-15Manuscript received on 27 March 2024 | Revised Manuscript received on 05 April 2024 | Manuscript Accepted on 15 April 2024 | Manuscript published on 30 April 2024.
References
- Nielsen, Michael A. (210). Quantum computing and quantum information, Chuang, Isaac L. (10th anniversary ed.). Cambridge: Cambridge University Press. ISBN 978-1107002173. OCLC665137861.
- Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, V. WaniRoychowdhury," A Proof of the Security of Quantum Key Distribution," Journal of Cryptology, 2006. https://doi.org/10.1007/s00145-005-0011-3
- ShorP W, Preskill J, "Simple proof of security of the BB84 quantum key distribution protocol," Physical Review, 2000. https://doi.org/10.1103/PhysRevLett.85.441
- J. Watrous, "The theory of quantum information,"(Cambridge University Press, Cambridge, 2018). https://doi.org/10.1017/9781316848142
- R. Horodecki, P. Horodecki, M. Horodecki, K. Horodecki, "Quantum entanglement, " Rev. Mod, Phys. 81, 865 (2009). https://doi.org/10.1103/RevModPhys.81.865
- W. K. Wootters, W. H. Zurek, "A single quantum cannot be cloned," Nature, Vol. 299(5886), 802-803(1982). https://doi.org/10.1038/299802a0
- Bennett CH, "Quantum cryptography using any two non orthogonal states," Physical Review, 1992. https://doi.org/10.1103/PhysRevLett.68.3121
- Rende Liu et al., "Analysis of polarization fluctuation in long-distance aerial fiber for QKD system design," Optical Fiber Technology, 2019.
- Xiaodong Zhong, Ge Jin, "Application of Hamming Code Based Erro Correction Algorithm in Quantum Key Distribution System", IEEE 3rd International Conference on Electronics Technology, University of Birmingham, 2020.
- Fangzhou Gao, "Practical Analysis of Discrete Variable Quantum Key Distribution", IEEE 2nd International Conference on Circuits and Systems, Bournemouth University, 2020.
- Xinyi Lin et al., "Quantum key distribution in partially-trusted QKD ring networks", 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE), Dalian, China, September 27-29, 2020.
- Pankaj R Chandre et al., "Machine Learning-Enhanced Advancements in Quantum Cryptography: A Comprehensive Review and Future Prospects", International Journal on Recent and Innovation Trends in Computing and Communication, Vol: 11, Issue: 11s, pp: 642-655, 2023. https://doi.org/10.17762/ijritcc.v11i11s.8300
- . Securing IOT Network through Quantum Key Distribution. (2019). In International Journal of Innovative Technology and Exploring Engineering (Vol. 8, Issue 6S4, pp. 693–696). https://doi.org/10.35940/ijitee.f1141.0486s419
- Era of Quantum Computing- An Intelligent and Evaluation based on Quantum Computers. (2019). In International Journal of Recent Technology and Engineering (Vol. 8, Issue 3S, pp. 615–619). https://doi.org/10.35940/ijrte.c1123.1083s19
- Kaushik, A., & Narwal, R. (2020). Integration of Quantum Computing with IoT. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 4, pp. 1307–1311). https://doi.org/10.35940/ijeat.d7931.049420
- C.T, A., O.O, O., O.A, A., & Grace, A. M. (2023). Cryptographic Security Approach for Biometric Verification System. In Indian Journal of Cryptography and Network Security (Vol. 3, Issue 2, pp. 7–13). https://doi.org/10.54105/ijcns.c7854.113223
- Soun, B., Saini, Dr. H. K., & Brar, Dr. K. K. (2023). Study on Properties of Sisal-Cotton Union Fabrics Developed in Handloom and Power-Loom for Textile Application. In Indian Journal of Fibre and Textile Engineering (Vol. 3, Issue 1, pp. 1–4). https://doi.org/10.54105/ijfte.a2405.053123