Abstract
Classical computers allow security of cryptographic protocols based on the mathematical complexity of encoding functions and the shared key. This implies that high computational power can have a positive outcome in breaking cryptographic protocols that employ classical computers. Quantum machines claim to possess such power. Two parties interested in communicating with each other take up the process of measuring entangled states in order to construct a secret key which is safeguarded against an eavesdropper capable of performing quantum operations. At first, experimental verification of the BB84 protocol using three bases has been performed in this paper, out of which sub-cases have been considered based on whether or not Eve has attempted an attack. The following part includes experimental realization of the B92 protocol which was introduced by Charles Bennett in the year 1992. Possibility of an Eve’s attack is considered and implemented. Succeeding part relies on experimental implementation of the protocol that was introduced by Acin, Massar and Pironio in the year 2006 (New J Phys 8:126, 2006). All the implementations have been done using the IBM Quantum Experience platform.












Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Hughes, R., Nordholt, J.: Refining quantum cryptography. Science 333, 1584 (2011)
Pathak, A.: Elements of Quantum Computation and Quantum Communication. CRC Press, Boca Raton (2018)
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. IEEE Int. Conf. Comput. Syst. Signal Process. 175, 8 (1984)
Bennett, C.H., Charles, H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560(Part 1), 7–11 (2014)
Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67(6), 661–663 (1991)
Bennett, C.H.: Quantum cryptography using any two non-orthogonal states. Phys. Rev. Lett. 68(21), 3121–3124 (1992)
Fan, H., Wang, Y., Jing, L., Yue, J., Shi, H., Zhang, Y., Mu, L.: Quantum cloning machines and the applications. Phys. Rep. 544, 241–322 (2014)
Fröhlich, B., Lucamarini, M., Dynes, J., Comandar, L., Tam, W., Plews, A., Sharpe, A., Yuan, Z., Shields, A.: Long-distance quantum key distribution secure against coherent attacks. Optica 4(1), 163–167 (2017)
Ferenczi, A., Narasimhachar, V., Lütkenhaus, N.: Security proof of the unbalanced phase-encoded Bennett-Brassard 1984 protocol. Phys. Rev. A 86, 042327 (2012)
Bennett, C.H., et al.: Experimental quantum cryptography. J. Cryptol. 5, 3–28 (1992)
Minder, M., et al.: Experimental quantum key distribution beyond the repeaterless secret key capacity. Nat. Photonics 13, 334–338 (2019)
Dhoha, AL-M., et al.: Quantum cryptography on IBM QX. IEEE Xplore, 18851058 (2013)
Acin, A., Massar, S., Pirono, S.: Efficient quantum key distribution secure against no-signalling eavesdroppers. New J. Phys. 8, 126 (2006)
Bouwmeester, D., Ekert, A., Zeilinger, A.: Lecture 12: quantum key distribution. Phys. Quantum Inf.
Nielson, M., Chuang, I.: Quantum Computing and Quantum Information. Cambridge University Press, Cambridge (2000)
McMahon, D.: Quantum Computing Explained. Wiley, New York (2007)
Bell, J.S.: On the Einstein Podolsky Rosen Paradox. Physics 1(3), 195–200 (1964)
Clauser, J.F., Horne, M.A., Shimony, A., Holt, R.A.: Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23(15), 880–4 (1969)
AL-Mubayedh, D., AL-Khalis, M., AL-Azman, G., AL-Abdali, M., AlFosail, M., Nagy, N.: Quantum cryptography on IBM QX. In: International Conference on Computer Applications & Information Security (2019)
Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802 (1982)
Garcia-Martin, D., Sierra, G.: Five experimental tests on the 5-qubit IBM quantum computer. J. Appl. Math. Phys. 6(7), 1460–1475 (2018)
Acknowledgements
A.W. would like to thank Bikash’s Quantum Pvt. Ltd. for providing hospitality during the course of this project. B.K.B. acknowledges the support of Prime Minister’s Research Fellowship awarded by DST, Govt. India. The authors acknowledge the support of IBM Quantum Experience for producing experimental results. The views expressed are those of the authors and do not reflect the official policy of IBM or IBM Quantum Experience team.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Warke, A., Behera, B.K. & Panigrahi, P.K. Experimental realization of three quantum key distribution protocols. Quantum Inf Process 19, 407 (2020). https://doi.org/10.1007/s11128-020-02914-z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-020-02914-z