Page 304 - Kaleidoscope Academic Conference Proceedings 2024
P. 304
2024 ITU Kaleidoscope Academic Conference
4.3 BBM92 of the type like, | ⟩ = 1 (|000⟩ + |011⟩ + |101⟩ + |110⟩),
2
Afterward, Bob and Charlie again separately select and
The Bell–Bennett 92 or BBM92 protocol [10] as proposed sample their received qubits and then concurrently report the
by Charles H. Bennett consists of Alice and Bob having outcomes that they get from Alice which, distributed particles
photons emitted from a single source. Alice abstains to Bob and Charlie while retaining one for herself. Depending
from launching photons emission and blending classical and on their selections, Alice performs different operations. If
Quantum information. In this protocol, Alice prepares the Bob and Charlie both measure on the {0, 1} basis. Alice does
EPR pairs that is of size and forwards bob qubits per likewise and derives a secret key bit subject to ⊕ ⊕ =
pair and the Alice retains the qubit. After that, Alice sets 0, where , , and denote Alice’s, Bob’s, and Charlie’s
up a bit stream of size and choses it as well. Bob receives measurement results. If Bob or Charlie decide to reflect their
and release a random -bit array. Going further, Alice qubit and then joint access to Alice’s secret key is guaranteed,
measures each qubit corresponding to , using X-axis making eavesdropping detection possible.
for = 0 and Z-axis for = 1, to the same time, bob does
the same operations using X-axis for = 0 and Z-axis for
4.6 DPS
= 1. In order to put across his measurement axis opting,
Bob tells Alice to him via the public way. Upon getting DPS (Differential Phase Shift) protocol [24] proposed by K.
Bob’s message, Alice sends its axis choice to him, i.e. , Inoue et al. in 2003 is another protocol that received addition
and Bob receives it. Measurements are found to be similar attention due to the fact that it is practically implemented
on those axis when the parties take turns to throw them out by the quantum key distribution system. This protocol uses
which fail due to poor geometric efficiency or ultraviolet rays coherent pulses in order to make certain there will be no active
which are not always perfect detector quantum efficiency, and beam splitting attacks. In this Protocol Alice generate a string
the leftovers will be used to get a private key . . of qubits of size . These Strings are encoded onto single
photon that is emitted at consecutive intervals. After that
4.4 SSP Alice transmits to Bob with the help of a quantum channel.
Now bob is ready to record the arrival times and detector
In 1999, H. B. Pasquinucci came up with the Six States
clicks at the second and third interval. Bob then uses a
Protocol (SSP) [22], later upgrade of this protocol by D.
public channel to communicate with Alice. When Alice
Barub it uses as many as three basis to enhance security
receives , she leverages her modulation data to detect Bob’s
Beyond the BB84. Alice randomly select a basis with a detector clicks. Therefore, Alice and Bob possess a similar
probability of 1 and then send qubits to bob. if the input
3 bit string, which is obtained from , , which represents the
number is increased then it enhances the difficulty for Eve to
common raw key; "0" denotes the first detector click, and "1"
intercept the message. The bases utilized by the Alice informs
denotes the second.
Bob via classical channel once they both have all qubits. Bob
estimates the key value of Alice basis. Furthermore, Eve,
4.7 SARG04
exploiting a random principle, attempt to intercept the Alice’s
qubits and sending another one to Bob. Probability of Eve to SCarani V. et al published SARG04 protocol [25] in 2004,
select the legitimate basis is 1 and the probability which she
3 the protocol has the ability to resist photon number splitting
2
will choose the wrong basis . Therefore, Bob’s probability
3 attacks. Thus, the entangled version of the protocol designed
3
of the correct qubits is this only .The three bases of SSP are
2 by Branciard C. et al showed better results against a variety
represented as :- Towards the -axis, -axis and -axis of the of attacks and got higher secret key rate, compared to the
Bloch Sphere respectively: BB84 protocol.Both the SARG04 and BB84 protocols share
the identical phase of transmission and measurement. Both
{|0⟩, |1⟩} (2) the SARG04 and BB84 possess the same beginning phases.
There is significant difference in the second phase. Alice
1 1 announces two non-orthogonal states in her second phase.
√ (|0⟩ + |1⟩), √ (|0⟩ − |1⟩) (3) Bob and Alice are currently validating which bases they
2 2
possess for each bit.It is essential that Bob and Alice both
1 1 validate the bases, while Alice encrypts her bit using one
√ (|0⟩ + |1⟩), √ (|0⟩ − |1⟩) (4)
2 2 of those bases secretly. Bob’s selection of the suitable
base enables bit acquisition viable by enabling accurate state
4.5 Secret Sharing measurement, else this bit acquisition would be impossible.
For the first time M. carried out a form of quantum 4.8 COW
secret sharing [23] strategy using GHZ states and
quantum technologies, which permitted the detection of Quantum Cryptography has witnessed a remarkable
eavesdropping. The Quantum Key Distribution (QKD) is development especially with the invention of the Coherent
also based on the principles of the Quantum entanglement One-Way protocol (COW) [26] in 2004, coherent invented by
which provides unconditional security. In this protocol, Alice Nicolas Gisin and co-workers, which is particularly suitable
makes an initial Entanglement to get ready three-particle state for Quantum Key Distribution (QKD) linked to weak coherent
– 260 –