Abstract
With the increasing information being shared online, the vast potential for cybercrime is a serious issue for individuals and businesses. Quantum key distribution (QKD) provides a way for distribution of secure key between two communicating parties. However, the current Quantum Key Distribution method, BB84 protocol, is prone to several weaknesses. These are Photon-Number-Splitting (PNS) attack, high Quantum Bit Error Rate (QBER), and low raw key efficiency. Thus, the objectives of this paper are to investigate the impacts of BB84 protocol towards QBER and raw key efficiencies in single quantum channel. Experiments were set up using a QKD simulator that was developed in Java NetBeans. The simulation study has reaffirmed the results of QBER and raw key efficiencies for the single quantum channel BB84 protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aaronson, S.: The limits of quantum computers. Sci. Am. 298, 62–69 (2008)
Gambetta, J.M., Chow, J.M., Steffen, M.: Building logical qubits in a superconducting quantum computing system. npj Quantum Inf. 3(2), 1–7 (2017)
Barreno, M.A.: The future of cryptography under quantum computers. Dartmouth College Computer Science Technical Reports (2002)
Murugesan, S., Colwell, B.: Next-generation computing paradigms. Computer 49, 14–20 (2016)
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin toss-ing. Theor. Comput. Sci. 560, 7–11 (2014)
Wiesner, S.: Conjugate coding. ACM SIGACT News 15, 78–88 (1983)
Brassard, G., Lütkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)
Jin, D., Verma, P.K., Kartalopoulos, S.V.: Fast convergent key distribution algorithms using a dual quantum channel. Secur. Commun. Netw. 2, 519–530 (2009)
Gao, J., Zhu, C., Xiao, H.: Efficient quantum key distribution scheme with pre-announcing the basis. EPL (Europhys. Lett.) 105, 60003 (2014)
Basu, S., Sengupta, S.: Modified BB84 protocol using CCD technology. J. Quantum Inf. Sci. 6, 31 (2016)
Amiri, P.: Quantum computers. IEEE Potentials 21, 6–9 (2002)
Rodney, V.M., Simon, J.D.: The path to scalable distributed quantum computing. Computer 49(9), 31–42 (2016)
Oraevsky, A.N.: On quantum computers. Quantum Electron. 30(5), 457–458 (2000)
Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802–803 (1982)
Heisenberg, W.: Physics and Philosophy. Prometheus Books, New York (1999)
Wiedemann, D.: Quantum cryptography. ACM SIGACT News 18, 48–51 (1986)
Li, H.-W., Yin, Z.-Q., Wang, S., Qian, Y.-J., Chen, W., Guo, G.-C., Han, Z.-F.: Random-ness determines practical security of BB84 quantum key distribution. Sci. Rep. 5, 16200 (2015)
Mogos, G.: Quantum key distribution protocol with four-state systems-software imple-mentation. Proc. Comput. Sci. 54, 65–72 (2015)
Senekane, M., Mafu, M., Petruccione, F.: Six-state symmetric quantum key distribution protocol. J. Quantum Inf. Sci. 5, 33 (2015)
Mafu, M.: A simple security proof for entanglement-based quantum key distribution. J. Quantum Inf. Sci. 6, 296 (2016)
Benletaief, N., Rezig, H., Bouallegue, A.: Toward efficient quantum key distribution reconciliation. J. Quantum Inf. Sci. 4, 117 (2014)
Elboukhari, M., Azizi, M., Azizi, A.: Quantum key distribution protocols: a survey. Int. J. Univ. Comput. Sci. 1, 59–67 (2010)
Erven, C., Ma, X., Laflamme, R., Weihs, G.: Entangled quantum key distribution with a biased basis choice. New J. Phys. 11, 045025 (2009)
Lo, H.-K., Chau, H.F., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18, 133–165 (2005)
Acknowledgment
This research project is funded by the Ministry of Education Malaysia (MOE) Fundamental Research Grant Scheme (Grant No: 0153AB-K42).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Foong, OM., Low, T.J., Hong, K.W. (2018). Simulation Study of Single Quantum Channel BB84 Quantum Key Distribution. In: Kim, K., Kim, H., Baek, N. (eds) IT Convergence and Security 2017. Lecture Notes in Electrical Engineering, vol 450. Springer, Singapore. https://doi.org/10.1007/978-981-10-6454-8_21
Download citation
DOI: https://doi.org/10.1007/978-981-10-6454-8_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6453-1
Online ISBN: 978-981-10-6454-8
eBook Packages: EngineeringEngineering (R0)