ABSTRACT
Two parties at a distance who wish to secretly communicate need a secret key to encrypt/decrypt the messages. To obtain the cryptographic key, the parties may agree on the cryptosystem to be used: symmetrical or asymmetrical. The aspect of symmetrical cryptosystems can be divided in two sub-aspects: encryption key distribution and use of an encryption method which is not vulnerable to attacks. This paper presents how we can use the classical method of Automatic Repeat Request-type to secure the procedure of encryption key distribution from Bechmann-Pasquinucci and Peres protocol. Consequently, for the transmission through the physical communication environment, the data are encapsulated in a frame by adding a header and a piece of control information.
- Bennett, C. and Brassard, G. 1984. Quantum cryptography: Public key distribution and coin tossing, Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing 175.Google Scholar
- Ekert, A. 1991. Quantum cryptography based on Bell's theorem, Phys. Rev. Lett. 67, pp. 49--52.Google ScholarCross Ref
- Bennett, C. 1992. Quantum cryptography using any two nonorthogonal states, Phys. Rev. Lett. 68, 3121.Google ScholarCross Ref
- Huang, W., Koh, I. and Han Y. 1998, Phys. Lett. A 244, 118--173.Google ScholarCross Ref
- Bechmann-Pasquinucci, H. and Peres, A. 2000. Quantum cryptography with 3-state systems, Phys. Rev. Lett.85.Google ScholarCross Ref
- Bruss, D. 1998. Phys. Rev. Lett. 81.Google Scholar
- Chen, P., Yan-Song, L., Fu-Guo, D., Long, D.L. 2007. Measuring-basis encrypted quantum key distribution with four-state systems, Commun. Theor. Phys. Beijing, China 47, 49--52.Google ScholarCross Ref
- Bostr, K. 2002. Deterministic secure direct communication using entanglement, Phys. Rev. Lett. 89.Google ScholarCross Ref
- Long, G. and Liu, X. 2002. Phys. Rev. A 65(032302).Google Scholar
- Deng, F., Long G., Liu X., Phys. Rev. A 68(0042317).Google Scholar
- Yan, F.L. and Q. Zhang Q. 2004. A scheme for secure direct communication using {EPR} pairs and teleportation, The European Physical Journal B 41(1), 75--78.Google ScholarCross Ref
- Yan, C., Shi-Bin, Z. and Li-Li, Y. 2013. A bidirectional quantum secure direct communication protocol based on five-particle cluster state, Chinese Physics Letters 30~(9).Google Scholar
- Yan, C., Shi-Bin, Z., Li-Li, Y. and Gui-Hua H., 2015. Controlled deterministic secure quantum communication protocol based on three-particle GHZ states in X-Basis, Commun. Theor. Phys. 63, 285--290.Google ScholarCross Ref
- Man, Z., Zhang Z., Li, Z. 2005. Quantum key distribution using polarization and frequency, Chin. Phys. Lett. 22(18), 32--44.Google Scholar
- Deng, F. and Long, G. 2003. Secure direct communication with a quantum one-time pad, Phys. Rev. A 69(052319).Google Scholar
- Bin, G. Yu-Gai, H. Xia, F. and Yu-Lin, C. 2011. Bidirectional quantum secure direct communication network protocol with hyperentanglement, Communications in Theoretical Physics 56~(4), pp.22--24.Google Scholar
- Comer, E. 1995. Internetworking with TCP/IP: Principles, Protocols, and Architecture, Prentice Hall. Google ScholarDigital Library
- Liu, X., Long, G. and Tong D., F.~Li, 2002. Physical Review A 65.Google Scholar
- Wootters, W.K. and Fields, B.~D. 1989. Optimal state-determination by mutually unbiased measurements, Annals of Physics 191, pp. 363--381.Google ScholarCross Ref
- Lawrence, J., Brukner, C. and Zeilinger, A. 2002. Mutually unbiased binary observable sets on n qubits, Physical Review A 65, 032320.Google ScholarCross Ref
- Bruss, D. and Macchiavello, C. 2002. Optimal eavesdropping in cryptography with three-dimensional quantum states, Phys. Rev. Lett. 88, 127901.Google ScholarCross Ref
- Bourennane, M., Karlsson, A., Bjork, G., Gisin, N. and Cerf, N. 2002. Quantum key distribution using multilevel encoding: Security analysis, J. Phys. A 35, 10065.Google ScholarCross Ref
Index Terms
- Sliding Window Method on Quantum Key Distribution Protocol
Recommendations
Multiparty quantum signature schemes
Digital signatures are widely used in electronic communications to secure important tasks such as financial transactions, software updates, and legal contracts. The signature schemes that are in use today are based on public-key cryptography and derive ...
Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach
The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they ...
Qutrit-based semi-quantum key distribution protocol
AbstractThis article provides the unconditional security of a semi quantum key distribution (SQKD) protocol based on 3-dimensional quantum states. By deriving a lower bound for the key rate, in the asymptotic scenario, as a function of the quantum channel’...
Comments