Entanglement and teleportation in quantum key distribution for secure wireless systems

被引:2
作者
Ahammed, Md. Ferdous [1 ]
Kadir, Mohammad Ismat [1 ,2 ]
机构
[1] Khulna Univ, Elect & Commun Engn, Khulna, Bangladesh
[2] Khulna Univ, Elect & Commun Engn, Khulna 9208, Bangladesh
来源
IET QUANTUM COMMUNICATION | 2024年
关键词
quantum communication; quantum cryptography; quantum entanglement; teleportation; PROBABILITY RELATIONS; CRYPTOGRAPHY; DIRECTIONS; ALGORITHM; PROTOCOL; BB84;
D O I
10.1049/qtc2.12092
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Entanglement-assisted quantum key distribution (QKD) has attracted significant attention for its ability to provide highly secure wireless systems. This work explores the employment of quantum teleportation and the quantum Fourier transform (QFT) in entanglement-assisted QKD to enhance security. By integrating the concepts of entanglement, teleportation, and QFT, the key distribution strategy is significantly improved, leading to more secure communication. The system has been thoroughly tested for quantum bit error rate, secure key rate, and reconciliation efficiency. The results show that this technique outperforms the standard BB84 protocol. Based on their simulations, this protocol appears to be a promising technique for providing quantum-level security to next-generation wireless communication systems. A quantum entanglement-aided and teleportation-based quantum key distribution system is proposed. The proposed protocol uses quantum Fourier transform for its implementation. The proposed protocol can provide enhanced security to wireless systems measured in terms of quantum bit error rate, secure key rate, and reconciliation efficiency. image
引用
收藏
页码:551 / 566
页数:16
相关论文
共 93 条
  • [1] EnQuad: A Publicly-Available Simulator for Quantum Key Distribution Protocols
    Abdelgawad, Mohamed S.
    Shenouda, Botrous A.
    Abdullatif, Sameh O.
    [J]. CYBERNETICS AND INFORMATION TECHNOLOGIES, 2020, 20 (01) : 21 - 35
  • [2] Abushgra A., 2015, 2015 Long Island Systems, Applications and Technology, P1
  • [3] Device-independent security of quantum cryptography against collective attacks
    Acin, Antonio
    Brunner, Nicolas
    Gisin, Nicolas
    Massar, Serge
    Pironio, Stefano
    Scarani, Valerio
    [J]. PHYSICAL REVIEW LETTERS, 2007, 98 (23)
  • [4] Quantum Key Distribution: Modeling and Simulation through BB84 Protocol Using Python']Python3
    Adu-Kyere, Akwasi
    Nigussie, Ethiopia
    Isoaho, Jouni
    [J]. SENSORS, 2022, 22 (16)
  • [5] Quantum for 6G communication: A perspective
    Ali, Muhammad Zulfiqar
    Abohmra, Abdoalbaset
    Usman, Muhammad
    Zahid, Adnan
    Heidari, Hadi
    Imran, Muhammad Ali
    Abbasi, Qammer H.
    [J]. IET QUANTUM COMMUNICATION, 2023, 4 (03): : 112 - 124
  • [6] Amiri PK, 2002, IEEE POTENTIALS, V21, P6, DOI 10.1109/MP.2002.1166617
  • [7] Quantum repeaters: From quantum networks to the quantum internet
    Azuma, Koji
    Economou, Sophia E.
    Elkouss, David
    Hilaire, Paul
    Jiang, Liang
    Lo, Hoi-Kwong
    Tzitrin, Ilan
    [J]. REVIEWS OF MODERN PHYSICS, 2023, 95 (04)
  • [8] Orthogonal Frequency-Division Multiplexed Quantum Key Distribution
    Bahrani, Sima
    Razavi, Mohsen
    Salehi, Jawad A.
    [J]. JOURNAL OF LIGHTWAVE TECHNOLOGY, 2015, 33 (23) : 4687 - 4698
  • [9] Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography
    Bechmann-Pasquinucci, H
    Gisin, N
    [J]. PHYSICAL REVIEW A, 1999, 59 (06): : 4238 - 4248
  • [10] Bell J.S., 1964, Physics, V1, P195, DOI [DOI 10.1103/PHYSICSPHYSIQUEFIZIKA.1.195, 10.1103/Physics-PhysiqueFizika.1.195]