Using Permutations to Enhance the Gain of RUQB Technique

نویسندگان

  • Abdulla M. Abu-ayyash
  • Naim Ajlouni
چکیده

Quantum key distribution (QKD) techniques usually suffer from a gain problem when comparing the final key to the generated pulses of quantum states. This research permutes the sets that RUQB (Abu-ayyash & Ajlouni, 2008) uses in order to increase the gain. The effect of both randomness and permutations are studied; While RUQB technique improves the gain of BB84 QKD by 5.5% it was also shown that the higher the randomness of the initial key the higher the gain that can be achieved, this work concluded that the use of around 7 permutations results in 30% gain recovery in an ideal situations. DOI: 10.4018/jitwe.2012040103 International Journal of Information Technology and Web Engineering, 7(2), 30-45, April-June 2012 31 Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. of quantum key distribution (QKD) protocols were proposed (Nung & Kuo, 2002; Bennett, 1992; Ekert, 1991; Kak, 2006; Kanamori, Yoo, & Al-Shurman, 2005; Bostrom & Felbinger, 2002; Lucamarini & Mancini, 2004; Wang, Koh, & Han, 1997; Barrett, Hardy, & Adrian, 2005). Some well-known protocols, in addition to implementations, suffers from big losses comparing the size of the final key to the number of quantum states (particles) used. The loss is due to the protocol implementation steps, in addition to the characteristics and implementations of physical devices and channels used (Abu-ayyash & Ajlouni, 2008; Bennett & Brassard, 1992). Researchers have already tried to solve this problem in a multi-dimensional space: first by enhancing the physical devices, channels, parameters and implementations (Chou, Polyakov, Kuzmich, & Kimble, 2004; Santori et al, 2004; Tisa, Tosi, & Zappa, 2007); second by increasing the information content in the quantum particle states used (Groblacher, Jennewein, Vaziri, Weihs, & Zeilinger, 2005; Kuang & Zhoul, 2004); third by using other quantum phenomena such as EPR (Einstein, Pololsky, & Rosen, 1935; Ekert, 1991; Kuang & Zhoul, 2004); fourth by changing or enhancing the way the protocol works (Abu-ayyash & Ajlouni, 2008; Nung & Kuo, 2002; Kak, 2006; Kanamori, Yoo, & Al-Shurman, 2005; Barrett, Hardy, & Adrian, 2005). For example Ching and Chen (Nung & Kuo, 2002) enhanced the gain of Bennett protocol B92 (Bennett, 1992) by using another stage back from Bob to Alice; where he sends back a new qubits using the same bases he used initially at the times where he fails to measure a qubit sent by Alice, this increases the key size by around 3.6% on the expense of more qubits. Another example, RUQB, uses a different technique for improving the gain, based on discovering the relationship among the original random bits that were used during the protocol to aid in enhancing the gain (by 5.5% for BB84) (Bennett & Brassard, 1984). In this research it is intended to investigate permuting RUQB sets to increase gain, and study the effect of this permutation on the security of this method. First, the QKD idea is presented along with RUQB; then we discuss the studied method of P-RUQB, afterwards we discuss gain analysis, followed by a discussion on security aspect of P-RUQB and then we conclude with the results. QUANTUM KEY DISTRIBUTION AND RUQB The basic element of quantum key distribution will be illustrated using the original four state QKD protocol developed by Bennett and Brassard in 1984 known as “BB84” protocol. Assume that the individual photons, precisely the polarization states of photons, serve as the quantum bits for the protocol. The protocol starts by one of the two parties transmitting a sequence of photons to the other party. The parties publicly agree to make use of the two distinct polarization bases which are chosen to be maximally non-orthogonal. In a completely random order, a sequence of photons are prepared in states of definite polarization in one or other of the two chosen bases and transmitted by one of the parties to the other through a channel that preserves the polarization. The photons are measured by the receiver in one or the other of the agreed upon bases, again chosen in a completely random order. The choices of bases made by the transmitter and receiver thus comprise two independent random sequences. Since they are independent random sequences of binary numbers, about half of the basis choices will be the same and are called the “compatible” bases, and the other half will be different and are called the “incompatible” bases. The two parties compare publicly, making use for this purpose of a classical communication channel, the two independent random sets of polarization bases that were used, without revealing the polarization states that were observed. Cryptographic protocols, in the absence of real random bit generator RBG, uses pseudorandom bit generator (PRBG). for that, it is required that the PRBG used for cryptography 14 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the product's webpage: www.igi-global.com/article/using-permutations-enhance-gainruqb/70384?camid=4v1 This title is available in InfoSci-Journals, InfoSci-Journal Disciplines Computer Science, Security, and Information Technology. Recommend this product to your librarian: www.igi-global.com/e-resources/libraryrecommendation/?id=2

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Utilizing Computer Simulation and DEAGP to Enhance Productivity in a Manufacturing System

Generally, a typical problem which is crucial in a manufacturing system is increasing the production rate.  To cope with the problem, different types of techniques are used in companies by trial and error which imposes high costs on them. Using simulation as a tool for assessing the effect of alterations on the performance of the overall system might be significant. This paper considers a simul...

متن کامل

Improving Linearity of CMOS Variable-gain Amplifier Using Third-order Intermodulation Cancellation Mechanism and Intermodulation Distortion Sinking Techniques

This paper presents an improved linearity variable-gain amplifier (VGA) in 0.18-µm CMOS technology. The lineari­ty improvement is resulted from employing a new combinational technique, which utilizes third-order-intermodulation (IM3) cancellation mechanism using second-order-intermodul­ation (­IM2) injection, and intermodulation distortion (IMD) sinking techniques. The proposed VGA gain cell co...

متن کامل

A Novel Intrusion Detection Systems based on Genetic Algorithms-suggested Features by the Means of Different Permutations of Labels’ Orders

Intrusion detection systems (IDS) by exploiting Machine learning techniques are able to diagnose attack traffics behaviors. Because of relatively large numbers of features in IDS standard benchmark dataset, like KDD CUP 99 and NSL_KDD, features selection methods play an important role. Optimization algorithms like Genetic algorithms (GA) are capable of finding near-optimum combination of the fe...

متن کامل

Stereotactic Body Radiotherapy for Lung Lesions using Multiple Phase 3D-CT Based on the Analysis of Radiobiological Parameters

Introduction: Planning target volume (PTV) is generated from internal treatment volume (ITV) using four-dimensional computed tomography (4D-CT) for enhanced therapeutic gain in the stereotactic body radiotherapy for lung lesions (SBRT-Lung). This study aimed to propose a strategy to generate ITV on multiple-phase 3D-CT and enhance therapeutic gain in SBRT-Lung. <stron...

متن کامل

A New Hybrid Framework for Filter based Feature Selection using Information Gain and Symmetric Uncertainty (TECHNICAL NOTE)

Feature selection is a pre-processing technique used for eliminating the irrelevant and redundant features which results in enhancing the performance of the classifiers. When a dataset contains more irrelevant and redundant features, it fails to increase the accuracy and also reduces the performance of the classifiers. To avoid them, this paper presents a new hybrid feature selection method usi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJITWE

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2012