skip to main content
10.1145/3310986.3311030acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmlscConference Proceedingsconference-collections
research-article

Sliding Window Method on Quantum Key Distribution Protocol

Published:25 January 2019Publication History

ABSTRACT

Two parties at a distance who wish to secretly communicate need a secret key to encrypt/decrypt the messages. To obtain the cryptographic key, the parties may agree on the cryptosystem to be used: symmetrical or asymmetrical. The aspect of symmetrical cryptosystems can be divided in two sub-aspects: encryption key distribution and use of an encryption method which is not vulnerable to attacks. This paper presents how we can use the classical method of Automatic Repeat Request-type to secure the procedure of encryption key distribution from Bechmann-Pasquinucci and Peres protocol. Consequently, for the transmission through the physical communication environment, the data are encapsulated in a frame by adding a header and a piece of control information.

References

  1. Bennett, C. and Brassard, G. 1984. Quantum cryptography: Public key distribution and coin tossing, Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing 175.Google ScholarGoogle Scholar
  2. Ekert, A. 1991. Quantum cryptography based on Bell's theorem, Phys. Rev. Lett. 67, pp. 49--52.Google ScholarGoogle ScholarCross RefCross Ref
  3. Bennett, C. 1992. Quantum cryptography using any two nonorthogonal states, Phys. Rev. Lett. 68, 3121.Google ScholarGoogle ScholarCross RefCross Ref
  4. Huang, W., Koh, I. and Han Y. 1998, Phys. Lett. A 244, 118--173.Google ScholarGoogle ScholarCross RefCross Ref
  5. Bechmann-Pasquinucci, H. and Peres, A. 2000. Quantum cryptography with 3-state systems, Phys. Rev. Lett.85.Google ScholarGoogle ScholarCross RefCross Ref
  6. Bruss, D. 1998. Phys. Rev. Lett. 81.Google ScholarGoogle Scholar
  7. Chen, P., Yan-Song, L., Fu-Guo, D., Long, D.L. 2007. Measuring-basis encrypted quantum key distribution with four-state systems, Commun. Theor. Phys. Beijing, China 47, 49--52.Google ScholarGoogle ScholarCross RefCross Ref
  8. Bostr, K. 2002. Deterministic secure direct communication using entanglement, Phys. Rev. Lett. 89.Google ScholarGoogle ScholarCross RefCross Ref
  9. Long, G. and Liu, X. 2002. Phys. Rev. A 65(032302).Google ScholarGoogle Scholar
  10. Deng, F., Long G., Liu X., Phys. Rev. A 68(0042317).Google ScholarGoogle Scholar
  11. Yan, F.L. and Q. Zhang Q. 2004. A scheme for secure direct communication using {EPR} pairs and teleportation, The European Physical Journal B 41(1), 75--78.Google ScholarGoogle ScholarCross RefCross Ref
  12. Yan, C., Shi-Bin, Z. and Li-Li, Y. 2013. A bidirectional quantum secure direct communication protocol based on five-particle cluster state, Chinese Physics Letters 30~(9).Google ScholarGoogle Scholar
  13. Yan, C., Shi-Bin, Z., Li-Li, Y. and Gui-Hua H., 2015. Controlled deterministic secure quantum communication protocol based on three-particle GHZ states in X-Basis, Commun. Theor. Phys. 63, 285--290.Google ScholarGoogle ScholarCross RefCross Ref
  14. Man, Z., Zhang Z., Li, Z. 2005. Quantum key distribution using polarization and frequency, Chin. Phys. Lett. 22(18), 32--44.Google ScholarGoogle Scholar
  15. Deng, F. and Long, G. 2003. Secure direct communication with a quantum one-time pad, Phys. Rev. A 69(052319).Google ScholarGoogle Scholar
  16. Bin, G. Yu-Gai, H. Xia, F. and Yu-Lin, C. 2011. Bidirectional quantum secure direct communication network protocol with hyperentanglement, Communications in Theoretical Physics 56~(4), pp.22--24.Google ScholarGoogle Scholar
  17. Comer, E. 1995. Internetworking with TCP/IP: Principles, Protocols, and Architecture, Prentice Hall. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Liu, X., Long, G. and Tong D., F.~Li, 2002. Physical Review A 65.Google ScholarGoogle Scholar
  19. Wootters, W.K. and Fields, B.~D. 1989. Optimal state-determination by mutually unbiased measurements, Annals of Physics 191, pp. 363--381.Google ScholarGoogle ScholarCross RefCross Ref
  20. Lawrence, J., Brukner, C. and Zeilinger, A. 2002. Mutually unbiased binary observable sets on n qubits, Physical Review A 65, 032320.Google ScholarGoogle ScholarCross RefCross Ref
  21. Bruss, D. and Macchiavello, C. 2002. Optimal eavesdropping in cryptography with three-dimensional quantum states, Phys. Rev. Lett. 88, 127901.Google ScholarGoogle ScholarCross RefCross Ref
  22. Bourennane, M., Karlsson, A., Bjork, G., Gisin, N. and Cerf, N. 2002. Quantum key distribution using multilevel encoding: Security analysis, J. Phys. A 35, 10065.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Sliding Window Method on Quantum Key Distribution Protocol

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICMLSC '19: Proceedings of the 3rd International Conference on Machine Learning and Soft Computing
      January 2019
      268 pages
      ISBN:9781450366120
      DOI:10.1145/3310986

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 25 January 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)6
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader