[go: up one dir, main page]

Skip to main content

Advertisement

Log in

Experimental realization of three quantum key distribution protocols

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Classical computers allow security of cryptographic protocols based on the mathematical complexity of encoding functions and the shared key. This implies that high computational power can have a positive outcome in breaking cryptographic protocols that employ classical computers. Quantum machines claim to possess such power. Two parties interested in communicating with each other take up the process of measuring entangled states in order to construct a secret key which is safeguarded against an eavesdropper capable of performing quantum operations. At first, experimental verification of the BB84 protocol using three bases has been performed in this paper, out of which sub-cases have been considered based on whether or not Eve has attempted an attack. The following part includes experimental realization of the B92 protocol which was introduced by Charles Bennett in the year 1992. Possibility of an Eve’s attack is considered and implemented. Succeeding part relies on experimental implementation of the protocol that was introduced by Acin, Massar and Pironio in the year 2006 (New J Phys 8:126, 2006). All the implementations have been done using the IBM Quantum Experience platform.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Hughes, R., Nordholt, J.: Refining quantum cryptography. Science 333, 1584 (2011)

    Article  ADS  Google Scholar 

  2. Pathak, A.: Elements of Quantum Computation and Quantum Communication. CRC Press, Boca Raton (2018)

    MATH  Google Scholar 

  3. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. IEEE Int. Conf. Comput. Syst. Signal Process. 175, 8 (1984)

    MATH  Google Scholar 

  4. Bennett, C.H., Charles, H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560(Part 1), 7–11 (2014)

    Article  MathSciNet  Google Scholar 

  5. Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67(6), 661–663 (1991)

    Article  ADS  MathSciNet  Google Scholar 

  6. Bennett, C.H.: Quantum cryptography using any two non-orthogonal states. Phys. Rev. Lett. 68(21), 3121–3124 (1992)

    Article  ADS  MathSciNet  Google Scholar 

  7. Fan, H., Wang, Y., Jing, L., Yue, J., Shi, H., Zhang, Y., Mu, L.: Quantum cloning machines and the applications. Phys. Rep. 544, 241–322 (2014)

    Article  ADS  MathSciNet  Google Scholar 

  8. Fröhlich, B., Lucamarini, M., Dynes, J., Comandar, L., Tam, W., Plews, A., Sharpe, A., Yuan, Z., Shields, A.: Long-distance quantum key distribution secure against coherent attacks. Optica 4(1), 163–167 (2017)

    Article  ADS  Google Scholar 

  9. Ferenczi, A., Narasimhachar, V., Lütkenhaus, N.: Security proof of the unbalanced phase-encoded Bennett-Brassard 1984 protocol. Phys. Rev. A 86, 042327 (2012)

    Article  ADS  Google Scholar 

  10. Bennett, C.H., et al.: Experimental quantum cryptography. J. Cryptol. 5, 3–28 (1992)

    Article  Google Scholar 

  11. Minder, M., et al.: Experimental quantum key distribution beyond the repeaterless secret key capacity. Nat. Photonics 13, 334–338 (2019)

    Article  ADS  Google Scholar 

  12. Dhoha, AL-M., et al.: Quantum cryptography on IBM QX. IEEE Xplore, 18851058 (2013)

  13. Acin, A., Massar, S., Pirono, S.: Efficient quantum key distribution secure against no-signalling eavesdroppers. New J. Phys. 8, 126 (2006)

    Article  ADS  Google Scholar 

  14. Bouwmeester, D., Ekert, A., Zeilinger, A.: Lecture 12: quantum key distribution. Phys. Quantum Inf.

  15. Nielson, M., Chuang, I.: Quantum Computing and Quantum Information. Cambridge University Press, Cambridge (2000)

    Google Scholar 

  16. McMahon, D.: Quantum Computing Explained. Wiley, New York (2007)

    Book  Google Scholar 

  17. Bell, J.S.: On the Einstein Podolsky Rosen Paradox. Physics 1(3), 195–200 (1964)

    Article  MathSciNet  Google Scholar 

  18. Clauser, J.F., Horne, M.A., Shimony, A., Holt, R.A.: Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23(15), 880–4 (1969)

    Article  ADS  Google Scholar 

  19. AL-Mubayedh, D., AL-Khalis, M., AL-Azman, G., AL-Abdali, M., AlFosail, M., Nagy, N.: Quantum cryptography on IBM QX. In: International Conference on Computer Applications & Information Security (2019)

  20. Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802 (1982)

    Article  ADS  Google Scholar 

  21. Garcia-Martin, D., Sierra, G.: Five experimental tests on the 5-qubit IBM quantum computer. J. Appl. Math. Phys. 6(7), 1460–1475 (2018)

    Article  Google Scholar 

Download references

Acknowledgements

A.W. would like to thank Bikash’s Quantum Pvt. Ltd. for providing hospitality during the course of this project. B.K.B. acknowledges the support of Prime Minister’s Research Fellowship awarded by DST, Govt. India. The authors acknowledge the support of IBM Quantum Experience for producing experimental results. The views expressed are those of the authors and do not reflect the official policy of IBM or IBM Quantum Experience team.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aakash Warke.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Warke, A., Behera, B.K. & Panigrahi, P.K. Experimental realization of three quantum key distribution protocols. Quantum Inf Process 19, 407 (2020). https://doi.org/10.1007/s11128-020-02914-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-020-02914-z

Keywords