全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Modified BB84 Protocol Using CCD Technology

DOI: 10.4236/jqis.2016.61004, PP. 31-38

Keywords: Quantum Cryptography, Quantum Key Distribution (QKD), Entanglement, Teleportation, Charge-Coupled Device (CCD)

Full-Text   Cite this paper   Add to My Lib

Abstract:

Quantum cryptography and especially quantum key distribution (QKD) is a technique that allocates secure keys only for a short distance. QKD protocols establish secure key by consent of both the sender and receiver. However, communication has to take place via an authenticate channel. Without this channel, QKD is vulnerable to man-in-the-middle attack. While not completely secure, it offers huge advantages over traditional methods by the use of entanglement swapping and quantum teleportation. In our research, we adopt the principle of charge-coupled device (CCD) to transfer the qubit from the sender to the receiver via a quantum channel. This technology has an added advantage over polarizer as only the circuit for transmitting the qubit is sufficient. No extra circuitry to implement the polarizer is required.

References

[1]  Moore, T. and Ballentine, K. (2012) Serpent Cipher Design and Analysis. A Report, Rochester University of Technology, Rochester.
[2]  Daemen, J. and Rijmen, V. (1999) AES Proposal: Rijndael. A Report, NIST, the Computer Security Resource Center (CSRC).
[3]  Mattle, K., Weinfurter, H., Kwiat, P.G. and Zeilinger, A. (1996) Dense Coding in Experimental Quantum Communication. Physical Review Letters, 76, 4656-4659.
[4]  Das, R., Mahesh, T.S. and Kumar, A. (2002) Implementation of Conditional Phase-Shift Gate for Quantum Information Processing by NMR, Using Transition-Selective Pulses. Journal of Magnetic Resonance, 159, 46-54.
http://dx.doi.org/10.1016/S1090-7807(02)00009-5
[5]  Nguyen, T.M.T., Sfaxi, M.A. and Ghernaouti-Hélie, S. (2006) 802.11i Encryption Key Distribution Using Quantum Cryptography. Journal of Networks, 1, no. 5,
[6]  Paterson, K.G., Piper, F. and Schack, R. (2007) Quantum Cryptography: A Practical Information Security Perspective. In: Zukowski, M., Kilin, S. and Kowalik, J., Eds., Quantum Communication and Security, Proceedings, NATO Advanced Research Workshop, IOS Press, Amsterdam, 175-180
[7]  Cederlöf, J. and Larsson, J.-Å. (2008) Security Aspects of the Authentication Used in Quantum Cryptography. IEEE Transactions on Information Theory, 54, 1735-1741.
http://dx.doi.org/10.1109/TIT.2008.917697
[8]  Bakhtiari, M. and Maarof, M.A. (2011) An Efficient Stream Cipher Algorithm for Data Encryption. International Journal of Computer Science Issues, 8, 247-253.
[9]  Sharma, R.D. (2011) Quantum Cryptography: A New Approach to Information Security. International Journal of Power System Operation and Energy Management (IJPSOEM), 1, 11-13.
[10]  Kulkarni, D.H. (2012) Research Directions in Quantum Cryptography and Quantum Key Distribution. International Journal of Scientific and Research Publications, 2, 1-3.
[11]  Reddy, I.S., Reddy, K.S., Reddy, M.P., Bhat, P.J. and Rajeev (2012) Key Distillation Process on Quantum Cryptography Protocols in Network Security. International Journal of Advanced Research in Computer Science and Software Engineering, 2, 19-24.
[12]  Tsurumaru, T. and Hayashi, M. (2013) Dual Universality of Hash Functions and Its Applications to Quantum Cryptography. IEEE Transactions on Information Theory, 59, 4700-4717.
http://dx.doi.org/10.1109/TIT.2013.2250576
[13]  Godhavari, T. and Alamelu, N.R. (2013) Quantum Encoder and Decoder for Secret Key Distribution with Check Bits. Research Journal of Applied Sciences, Engineering and Technology, 6, 4381-4386.
[14]  Luo, W.J. and Liu, G.L. (2014) Asymmetrical Quantum Encryption Protocol Based on Quantum Search Algorithm. Journal of China Communications, 11, 104-111.
[15]  Kilor, P.P. and Soni, P.D. (2014) Quantum Cryptography: Realizing next Generation Information Security. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 3, 286-289.
[16]  Elliott, C. (2004) Quantum Cryptography. IEEE Security & Privacy, 2, 57-61.
http://dx.doi.org/10.1109/MSP.2004.54
[17]  LaMonica, M. (2013) Long-Distance Quantum Cryptography. IEEE Spectrum, 50, 12-13.
[18]  Hughes, R.J., Alde, D.M., Dyer, P., Luther, G.G., Morgan, G.L. and Schauer, M. (1995) Quantum Cryptography. LA-UR-95-806.
http://arxiv.org/abs/quant-ph/9504002
[19]  Wijesekera, S. (2011) Quantum Cryptography for Secure Communication in IEEE 802.11 Wireless Networks. PhD Thesis, University of Canberra, Bruce.
[20]  Peterson, C. (2000) How It Works: The Charged-Coupled Device, or CCD. The Journal of Young Investigators, 3.
[21]  Felber, P. (2002) Charge-Coupled Devices: A Literature Study. Illinois Institute of Technology, Chicago.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133