[go: up one dir, main page]

Ali et al., 2024 - Google Patents

Optimizing Quantum Key Distribution Protocols using Decoy State Techniques and Experimental Validation

Ali et al., 2024

View PDF
Document ID
7612453964240136612
Author
Ali S
Djaouida B
Publication year
Publication venue
Engineering, Technology & Applied Science Research

External Links

Snippet

This paper simulated the operation of vacuum state and single decoy state protocols in the BB84 and SARG04 QKD schemes by utilizing the features of the commercial ID-3000 QKD system. Numerical modeling identified an optimal signal-to-decoy state ratio of 0.95: 0.05 …
Continue reading at www.etasr.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/29Repeaters
    • H04B10/291Repeaters in which processing or amplification is carried out without conversion of the main signal from optical form
    • H04B10/299Signal waveform processing, e.g. reshaping or retiming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/38Synchronous or start-stop systems, e.g. for Baudot code
    • H04L25/40Transmitting circuits; Receiving circuits
    • H04L25/49Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels; Baseband coding techniques specific to data transmission systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/50Transmitters
    • H04B10/516Details of coding or modulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/70Photonic quantum communication

Similar Documents

Publication Publication Date Title
US11411724B2 (en) Continuous variable quantum secret sharing
Zhao et al. Experimental quantum key distribution with decoy states
Hong et al. Quantum identity authentication with single photon
US9160529B2 (en) Secret communication system and method for generating shared secret information
Collins et al. Experimental demonstration of quantum digital signatures over 43 dB channel loss using differential phase shift quantum key distribution
CN112929161A (en) Plug-and-play type reference system-independent double-field quantum key distribution protocol implementation method
CN113141252B (en) Quantum key distribution method, quantum communication method, device and system
Zahidy et al. Practical high-dimensional quantum key distribution protocol over deployed multicore fiber
Shapiro et al. Quantum low probability of intercept
KR20040058326A (en) Cryptographic communication apparatus
Pljonkin et al. The review of the commercial quantum key distribution system
JPWO2006025410A1 (en) Quantum key distribution protocol
Al‐Ghamdi et al. On the security and confidentiality of quantum key distribution
US8472626B2 (en) System and method for the secure transmission of binary code by phase-and intensity-coding
Khalil et al. Security performance of public key distribution in coherent optical communications links
Guerreau et al. Quantum key distribution without a single-photon source using a strong reference
Ali et al. Optimizing Quantum Key Distribution Protocols using Decoy State Techniques and Experimental Validation
Sampson et al. High-speed random-channel cryptography in multimode fibers
Gilbert et al. Secrecy, computational loads and rates in practical quantum cryptography
Wang et al. Experimental coherent-state quantum secret sharing with finite pulses
Jacak et al. Quantum cryptography: Theoretical protocols for quantum key distribution and tests of selected commercial qkd systems in commercial fiber networks
Sharma et al. Transmission and control for QKD in online banking systems
Huang Quantum hacking in the age of measurement-device-independent quantum cryptography
EP4047860A1 (en) Long-distance quantum key distribution
Choi et al. Measurement device hacking-free mutual quantum identity authentication over a deployed optical fiber