Enhancement of Error Correction in Quantum Cryptography BB84 Protocol

نویسندگان

  • Amr Goneid
  • Sherif El-Kassas
  • M. El-Ashmawy
  • A. Abbas
چکیده

The Quantum Cryptography BB84 protocol has proved to be quite successful in the process of Quantum Key Distribution (QKD). The protocol is used to create a secure key that is shared between two communicating parties. A major phase in this protocol is the correction of errors and discrepancies between keys of sender and receiver. The present work is concerned with enhancing the error correction phase in such protocol so that the keys generated would be created more efficiently; i.e., to enable the creation of longer shared keys in less time. For this purpose, we have introduced an algorithm based on the use of a memory structure between rounds of the error correction phase. The advantages of the algorithm presented in this paper are established using simulated experiments. A performance evaluation parameter is computed as the ratio of key length to the total operations needed to reach it. This value needs to be maximized for best performance. The experimental results have been compared through a parameterization model assuming that the relative increase in evaluation is linear in the block size increment. Parameters deduced from the experiments show that the performance of the enhanced algorithm is better by a factor of approximately 1.7 – 3.1 relative to the standard algorithm for initial block sizes ≥ 0.5 % of the key length, and by a factor of 1.15 – 1.30 for initial block sizes < 0.5 % of the key length.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the optimality of individual entangling-probe attacks against BB84 quantum key distribution

Some MIT researchers [Phys. Rev. A 75, 042327 (2007)] have recently claimed that their implementation of the Slutsky-Brandt attack [Phys. Rev. A 57, 2383 (1998); Phys. Rev. A 71, 042312 (2005)] to the BB84 quantum-key-distribution (QKD) protocol puts the security of this protocol “to the test” by simulating “the most powerful individual-photon attack” [Phys. Rev. A 73, 012315 (2006)]. A related...

متن کامل

An introduction to quantum error correction

Communication at high speeds, long distances, and in unknown environments often requires combatting noise that may affect or destroy data before it has reached its intended destination. When designing robust, practical communication systems, it is important to take such effects into account and engineer a system to be as immune to noise as possible. Classical communications often relies upon va...

متن کامل

Proof of security of quantum key distribution with two-way classical communications

Shor and Preskill have provided a simple proof of security of the standard quantum key distribution scheme by Bennett and Brassard (BB84) by demonstrating a connection between key distribution and entanglement purification protocols with one-way communications. Here we provide proofs of security of standard quantum key distribution schemes, BB84 and the six-state scheme, against the most genera...

متن کامل

nt - p h / 01 01 09 8 v 2 1 8 Se p 20 01 Quantum cryptography

II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical (public-key) cryptosystems . . . . . . . . . . . . . . . 3 2 Symmetrical (secret-key) cryptosystems . . . . . . . . . . . . . . . . . 4 3 The one-time-pad as “classical teleportation” . . . . . . . . . . . . . . 5 C The example of the BB84 protocol . . . 5 1 Principl...

متن کامل

Raw-data Attacks in Quantum Cryptography with Partial Tomography

We consider a variant of the BB84 protocol for quantum cryptography, the prototype of tomographically incomplete protocols, where the key is generated by one-way communication rather than the usual two-way communication. Our analysis, backed by numerical evidence, establishes thresholds for eavesdropping attacks on the raw data and on the generated key at quantum bit error rates of 10% and 6.15...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Egyptian Computer Science Journal

دوره 31  شماره 

صفحات  -

تاریخ انتشار 2009