Page 305 - Kaleidoscope Academic Conference Proceedings 2024
P. 305
Innovation and Digital Transformation for a Sustainable World
pulses operating at high bit rates. In particular, its ease can receive. In the very next step, sends string of results
of operation and resistance to spoofing and photon number to for estimation of mutually agreed upon error rates by the
splitter attacks ensure superior performance in producing involved parties. Then, they in turn record the experiment
secret bits per qubit.Temporary encoding of information is outputs. Consequently, if Alice confirms that there is no
performed by Alice, who sends coherent pulses with mean eavesdropping from node A, Bob moves to the next step and
photon number < 1, which correspond to logical bits give the key which was produced from node .
expressed as sequences such as − 0 for "0" or 0 −
for "1". For security, dummy sequences ( − ) might 4.13 Knapsack Encoding
be transmitted. Bob analyses the photon timing of arrival
at detector to get the key. Security measures include A secure quantum key distribution protocol [31] that is based
Bob randomly assessing coherence between successive pulses on super-increasing knapsack sequences. By mapping these
using an detectors 1 and 2, where loss of coherence sequences to quantum states by rotating a three-bit quantum
indicates potential eavesdropping, prompting key rejection tuple, it solves the problem of how encryption keys will be
without loss of information. shared between communicating parties, demonstrating the
ability of quantum cryptography to refresh the concept of
4.9 KMB09 network security.
The KMB09 Quantum Key Distribution (QKD) protocol [27] 4.14 QKE
illustrates the extension of the communication path without
intermediate relay in a single photon channel having a high A quantum-key-expansion (QKE) protocol [32]
degree of noise tolerance and eavesdropping robustness, to enhance the secure key rate in quantum key
especially for long-distance transmission. -sized strings ( ) distribution (QKD). By compressing singlet states with
and matching -sized qubits ( ) are generated by Alice, number-state-entanglement-preserving tensors, the protocol
which then encodes them with and bases (’0’ and ’1’, achieves a compressed two-body-entangled state, expanding
respectively). after that and are also sent to Bob through the cryptographic key.
both quantum and classical channels. Bob communicates
back to Alice while analyzing the basis modifications of the 4.15 Modified BB84
qubits and records the values as and . The remaining
bits represent the private key , which is decided by both This protocol [33] enhances BB84 quantum key distribution
parties. method’s security regardless of the flaws that characterize the
source. It does so by adopting events that are otherwise often
4.10 SR CV-QKD neglected and employing a specific mathematical instrument,
which increases the protection against flaws and attacks even
Self-Referenced CV-QKD(SR CV-QKD) protocol [28] further. In contrast to other protocols, this updated BB84
removes the need for high-power local oscillator transmission, protocol is rather efficient in case of imperfect conditions,
aligning measurement bases with reference pulses. The therefore, it is safer for usage in real life.
fiber-based experimental demonstration quantifies secret key
rates, simplifying CV-QKD hardware and advancing scalable 4.16 PHQKD-MF
integrated transceivers for large-scale QKD networks.
This protocol [34] deals with the key rate problem in QKD
4.11 Twin-Field QKD systems where the rate of generated keys is considerably
high through the use of 4D hybrid time-path encoding. Its
An innovative quantum key distribution (QKD) scheme where performance was shown in a more practical arrangement
phase-randomized optical fields are generated at distant with actual results obtained over a 52-km deployed multicore
locations and combined centrally [29]. This twin-field fiber link. According to their findings, integrating standard
QKD achieves key rates scaling with the square-root of telecom equipment with multicore fiber technology supports
channel transmittance, like quantum repeaters, yet feasible reliable high dimensional QKD.
with current technology. It extends secure communication
range, overcoming QKD’s rate-distance limit. 5. INDUSTRIALIZATION OF QUANTUM
COMMUNICATION
4.12 LLP
Quantum communication poses a different approach on
The quantum layer protocol (LLP) [30], which delivers information exchange from traditional methods by ensuring
superior results in long-distance transmission efficiency, was high levels of security and speed. There are several
introduced by A. Dahlberg in 2019. In this protocol, The established projects that have contributed to this technology
’n’ qubits that Alice chose are going to be included in the through funding from Horizon 2020 and the National Science
transmission mode, which will send them from node to Foundation (NSF) [46].
=
Bob’s node . Later, nodes and enter an entangled state The AQuS project (2015-2017, C 2,000,500) created the
with an encoded qubit used in the current basis ’ ’, which platforms of dynamical simulators in quantum physics
– 261 –