Page 305 - Kaleidoscope Academic Conference Proceedings 2024
P. 305

Innovation and Digital Transformation for a Sustainable World




           pulses operating at high bit rates. In particular, its ease  can receive. In the very next step,   sends    string of results
           of operation and resistance to spoofing and photon number  to    for estimation of mutually agreed upon error rates by the
           splitter attacks ensure superior performance in producing  involved parties. Then, they in turn record the experiment
           secret bits per qubit.Temporary encoding of information is  outputs. Consequently, if Alice confirms that there is no
           performed by Alice, who sends coherent pulses with mean  eavesdropping from node A, Bob moves to the next step and
           photon number    < 1, which correspond to logical bits  give the key which was produced from node   .
           expressed as sequences such as    − 0 for "0" or 0 −   
           for "1".  For security, dummy sequences (   −   ) might  4.13  Knapsack Encoding
           be transmitted. Bob analyses the photon timing of arrival
           at detector       to get the key. Security measures include  A secure quantum key distribution protocol [31] that is based
           Bob randomly assessing coherence between successive pulses  on super-increasing knapsack sequences. By mapping these
           using an detectors     1 and     2, where loss of coherence  sequences to quantum states by rotating a three-bit quantum
           indicates potential eavesdropping, prompting key rejection  tuple, it solves the problem of how encryption keys will be
           without loss of information.                       shared between communicating parties, demonstrating the
                                                              ability of quantum cryptography to refresh the concept of
           4.9  KMB09                                         network security.

           The KMB09 Quantum Key Distribution (QKD) protocol [27]  4.14  QKE
           illustrates the extension of the communication path without
           intermediate relay in a single photon channel having a high  A  quantum-key-expansion  (QKE)  protocol  [32]
           degree of noise tolerance and eavesdropping robustness,  to enhance the secure key rate in quantum key
           especially for long-distance transmission.  -sized strings (      )  distribution (QKD). By compressing singlet states with
           and matching   -sized qubits (  ) are generated by Alice,  number-state-entanglement-preserving tensors, the protocol
           which then encodes them with    and    bases (’0’ and ’1’,  achieves a compressed two-body-entangled state, expanding
           respectively). after that    and       are also sent to Bob through  the cryptographic key.
           both quantum and classical channels. Bob communicates      
           back to Alice while analyzing the basis modifications of the  4.15  Modified BB84
           qubits and records the values as       and       . The remaining
           bits represent the private key         , which is decided by both  This protocol [33] enhances BB84 quantum key distribution
           parties.                                           method’s security regardless of the flaws that characterize the
                                                              source. It does so by adopting events that are otherwise often
           4.10 SR CV-QKD                                     neglected and employing a specific mathematical instrument,
                                                              which increases the protection against flaws and attacks even
           Self-Referenced CV-QKD(SR CV-QKD) protocol [28]    further. In contrast to other protocols, this updated BB84
           removes the need for high-power local oscillator transmission,  protocol is rather efficient in case of imperfect conditions,
           aligning measurement bases with reference pulses.  The  therefore, it is safer for usage in real life.
           fiber-based experimental demonstration quantifies secret key
           rates, simplifying CV-QKD hardware and advancing scalable  4.16  PHQKD-MF
           integrated transceivers for large-scale QKD networks.
                                                              This protocol [34] deals with the key rate problem in QKD
           4.11 Twin-Field QKD                                systems where the rate of generated keys is considerably
                                                              high through the use of 4D hybrid time-path encoding. Its
           An innovative quantum key distribution (QKD) scheme where  performance was shown in a more practical arrangement
           phase-randomized optical fields are generated at distant  with actual results obtained over a 52-km deployed multicore
           locations and combined centrally [29].  This twin-field  fiber link. According to their findings, integrating standard
           QKD achieves key rates scaling with the square-root of  telecom equipment with multicore fiber technology supports
           channel transmittance, like quantum repeaters, yet feasible  reliable high dimensional QKD.
           with current technology. It extends secure communication
           range, overcoming QKD’s rate-distance limit.            5.  INDUSTRIALIZATION OF QUANTUM
                                                                               COMMUNICATION
           4.12  LLP
                                                              Quantum communication poses a different approach on
           The quantum layer protocol (LLP) [30], which delivers  information exchange from traditional methods by ensuring
           superior results in long-distance transmission efficiency, was  high levels of security and speed.  There are several
           introduced by A. Dahlberg in 2019. In this protocol, The  established projects that have contributed to this technology
           ’n’ qubits that Alice chose are going to be included in the  through funding from Horizon 2020 and the National Science
           transmission mode, which will send them from node    to  Foundation (NSF) [46].
                                                                                         =
           Bob’s node   . Later, nodes    and    enter an entangled state  The AQuS project (2015-2017, C 2,000,500) created the
           with an encoded qubit used in the current basis ’  ’, which     platforms of dynamical simulators in quantum physics



                                                          – 261 –
   300   301   302   303   304   305   306   307   308   309   310