Implementation of Secure Quantum Protocol using Multiple Photons for Communication
نویسندگان
چکیده
The paper presents the implementation of a quantum cryptography protocol for secure communication between servers in the cloud. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. The three-stage protocol, whose implementation is described in this paper, is a departure from conventional practice and it obviates some of the known vulnerabilities of the current implementations of quantum cryptography. This paper presents an implementation of the three-stage quantum communication protocol in free-space. To the best of the authors’ knowledge, this is the first implementation of a quantum protocol where multiple photons can be used for secure
منابع مشابه
Quantum Secure Communication Protocol Based on Single-photon
Two-way quantum secure communication protocol and one-way quantum secure communication protocol based on single photon sequence and the XOR operation have been proposed, one-way communication can confuse the eavesdroppers and two-way communication only a single authentication and there is not visible to eavesdropping and delayed photon attack Trojan horse attack. The new agreement the use of si...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملDeterministic Secure Communication Using Quantum Nonlocality
Quantum key distribution (QKD) is a protocol which is provably secure, by which private bit can be created between two parties over a public channel. Based on the postulate of quantum measurement [1] and no-cloning theorem [2], different QKD protocol are presented [3]. However, these type of cryptographic schemes are usually nondeterministic. A Beige et al. have presented a quantum communicatio...
متن کاملMultiparty Secure Communication by Using Quantum Key Distribution Protocols
By using the order rearrangement of the single photon sequence and unitary transformations, a mult iparty controlled quantum communication scheme for Carrier Sense Multiple Access with Collision Detection(CSMA/CD) is presented .In this scheme, messages can only be recovered by the receivers with the permission of all controllers .It is shown that the security of messages transformat ion can be ...
متن کاملPhotonic quantum computers and communication systems
Quantum information processors have been proposed to solve classically intractable or unsolvable problems in computing, sensing, and secure communication. There has been growing interest in photonic implementations of quantum processors as they offer relatively long coherence lengths, precise state manipulation, and efficient measurement. In this thesis, we first present experimental techniques...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1208.6198 شماره
صفحات -
تاریخ انتشار 2012