Quantum Key Distribution with Qubit Pairs

Abstract

We propose a new Quantum Key Distribution method in which Alice sends pairs of qubits to Bob; each is in one of four possible states. Bob uses one qubit to generate a secure key and the other to generate an auxiliary key. For each pair he randomly decides which qubit to use for which key. The auxiliary key has to be added to Bob’s secure key in order to match Alice’s secure key. This scheme provides an additional layer of security over the standard BB84 protocol.

Share and Cite:

Siddiqui, M. and Qureshi, T. (2014) Quantum Key Distribution with Qubit Pairs. Journal of Quantum Information Science, 4, 129-132. doi: 10.4236/jqis.2014.43014.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Gisin, N., et al. (2002) Quantum Cryptography. Reviews of Modern Physics, 74, 145.
http://dx.doi.org/10.1103/RevModPhys.74.145
[2] Scarani, V., et al. (2009) The Security of Practical Quantum Key Distribution. Reviews of Modern Physics, 81, 1301.
http://dx.doi.org/10.1103/RevModPhys.81.1301
[3] Bennett, C.H. and Brassard, G. (1984) Quantum Cryptography: Public-Key Distribution and Coin Tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, 175-179.
[4] Bennett, C.H. and Brassard, G. (1985) Quantum Public Key Distribution. IBM Technical Disclosure Bulletin, 28, 3153-3163.
[5] Vernam, G.S. (1926) Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications. Transactions of the American Institute of Electrical Engineers, 45, 295-301.
[6] Shor, P.W. and Preskill, J. (2000) Simple Proof of Security of the BB84 Quantum Key Distribution Protocol. Physical Review Letters, 85, 441-444.
http://dx.doi.org/10.1103/PhysRevLett.85.441
[7] Fung, C.-H.F., et al. (2007) Phase-Remapping Attack in Practical Quantum-Key-Distribution Systems. Physical Review A, 75, Article ID: 032314.
http://dx.doi.org/10.1103/PhysRevA.75.032314
[8] Xu, F., Qi, B. and Lo, H.-K. (2010) Experimental Demonstration of Phase-Remapping Attack in a Practical Quantum Key Distribution System. New Journal of Physics, 12, Article ID: 113026.
http://dx.doi.org/10.1088/1367-2630/12/11/113026
[9] Qi, B., et al. (2007) Time-Shift Attack in Practical Quantum Cryptosystems. Quantum Information Computation, 7, 73-82.
[10] Zhao, Y., et al. (2008) Quantum Hacking: Experimental Demonstration of Time-Shift Attack against Practical Quantum-Key-Distribution Systems. Physical Review A, 78, Article ID: 042333.
http://dx.doi.org/10.1103/PhysRevA.78.042333
[11] Lydersen, L., et al. (2010) Hacking Commercial Quantum Cryptography Systems by Tailored Bright Illumination. Nature Photonics, 4, 686-689.
http://dx.doi.org/10.1038/nphoton.2010.214
[12] Gerhardt, I., et al. (2011) Full-Field Implementation of a Perfect Eavesdropper on a Quantum Cryptography System. Nature Communications, 2, 349.
http://dx.doi.org/10.1038/ncomms1348
[13] Shaari, J.S., Lucamarini, M. and Wahiddin, M.R.B. (2006) Deterministic Six States Protocol for Quantum Communication. Physics Letters A, 358, 85-90.
http://dx.doi.org/10.1016/j.physleta.2006.05.007
[14] Deng, F.-G. and Long, G.L. (2003) Controlled Order Rearrangement Encryption for Quantum Key Distribution. Physical Review A, 68, Article ID: 042315.
http://dx.doi.org/10.1103/PhysRevA.68.042315

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.