A quantum key distribution on qudits using quantum operators

Journal article


Authors/Editors


Strategic Research Themes


Publication Details

Author listJirakitpuwapat, Wachirapong; Kumam, Poom; Deesuwan, Tanapat; Dhompongsa, Sompong;

PublisherWiley

Publication year2020

JournalMathematical Methods in the Applied Sciences (0170-4214)

ISSN0170-4214

eISSN1099-1476

URLhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85096800388&doi=10.1002%2fmma.6988&partnerID=40&md5=29b3ed96ff51435806be43e7f1cefbc7

LanguagesEnglish-Great Britain (EN-GB)


View in Web of Science | View on publisher site | View citing articles in Web of Science


Abstract

Cryptography is processing for securing communication between two people. The opponent wants to know the message that is encrypted using a secret key. Although the opponent can eavesdrop the message sent between the sender and the receiver, the opponent is unable to decrypt to read the message. Therefore, the secret key is very important. The sender and the receiver agree with the secret key in an insecure channel by using key distribution protocol such as the Diffie–Hellman protocol. Since quantum computer is coming soon, Diffie–Hellman protocol is not secure. We will develop a quantum key distribution protocol. The benefit of the quantum system is the quantum state that cannot copy by no-cloning theorem. Thus, the opponent does not copy and keeps the message that is quantum. In this paper, a novel quantum key distribution protocol between two people (Alice and Bob) based on quantum operators is developed. The opponent (Eve) wants to know the secret key. Although Eve knows this quantum key distribution protocol, Eve does not behave similarly to Alice and Bob. For example, Eve eavesdrops Alice's quantum state that was sent to Bob, and Eve sends another quantum state. Therefore, we cannot control Eve's behavior. So we give the upper bound of mutual information between the user and opponent by using Holevo's bound. We verify the usual security definition for quantum key distribution that is equality-and-uniformity and privacy in the mutual information sense. © 2020 John Wiley & Sons, Ltd.


Keywords

B92 protocolBB84 protocolHolevo's BoundNo-cloning theoremQuantum Key Distributionthree-stage quantum cryptography


Last updated on 2023-29-09 at 10:30