Improving efficiency of quantum key distribution with probabilistic measurements

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

The first part of this paper presents two efficient cryptographic protocols, based on quantum entanglement, for secure exchange of secret keys. While the first protocol requires storage of entangled qubits, the second protocol has no storage requirements and presents a probabilistic model. We show that there is a tradeoff between security against eavesdropping and the efficiency of the protocol in terms of usable bits available for the secret key. This security parameter s can be varied by the communicating parties based on practical considerations. In the second part of the paper, we apply the probabilistic model to BB84 and show how it can be used to improve the efficiency of BB84.

Original languageEnglish (US)
Pages (from-to)37-47
Number of pages11
JournalInternational Journal of Security and Networks
Volume11
Issue number1-2
DOIs
StatePublished - 2016

Fingerprint

Quantum cryptography
Quantum entanglement
Statistical Models

Keywords

  • Efficiency improvement
  • Probabilistic model for QKD
  • Quantum key distribution

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Cite this

Improving efficiency of quantum key distribution with probabilistic measurements. / Parakh, Abhishek; Verma, Pramode; Subramaniam, Mahadevan.

In: International Journal of Security and Networks, Vol. 11, No. 1-2, 2016, p. 37-47.

Research output: Contribution to journalArticle

@article{7593076183ce45d29715c17de17afa16,
title = "Improving efficiency of quantum key distribution with probabilistic measurements",
abstract = "The first part of this paper presents two efficient cryptographic protocols, based on quantum entanglement, for secure exchange of secret keys. While the first protocol requires storage of entangled qubits, the second protocol has no storage requirements and presents a probabilistic model. We show that there is a tradeoff between security against eavesdropping and the efficiency of the protocol in terms of usable bits available for the secret key. This security parameter s can be varied by the communicating parties based on practical considerations. In the second part of the paper, we apply the probabilistic model to BB84 and show how it can be used to improve the efficiency of BB84.",
keywords = "Efficiency improvement, Probabilistic model for QKD, Quantum key distribution",
author = "Abhishek Parakh and Pramode Verma and Mahadevan Subramaniam",
year = "2016",
doi = "10.1504/IJSN.2016.075075",
language = "English (US)",
volume = "11",
pages = "37--47",
journal = "International Journal of Security and Networks",
issn = "1747-8405",
publisher = "Inderscience Enterprises Ltd",
number = "1-2",

}

TY - JOUR

T1 - Improving efficiency of quantum key distribution with probabilistic measurements

AU - Parakh, Abhishek

AU - Verma, Pramode

AU - Subramaniam, Mahadevan

PY - 2016

Y1 - 2016

N2 - The first part of this paper presents two efficient cryptographic protocols, based on quantum entanglement, for secure exchange of secret keys. While the first protocol requires storage of entangled qubits, the second protocol has no storage requirements and presents a probabilistic model. We show that there is a tradeoff between security against eavesdropping and the efficiency of the protocol in terms of usable bits available for the secret key. This security parameter s can be varied by the communicating parties based on practical considerations. In the second part of the paper, we apply the probabilistic model to BB84 and show how it can be used to improve the efficiency of BB84.

AB - The first part of this paper presents two efficient cryptographic protocols, based on quantum entanglement, for secure exchange of secret keys. While the first protocol requires storage of entangled qubits, the second protocol has no storage requirements and presents a probabilistic model. We show that there is a tradeoff between security against eavesdropping and the efficiency of the protocol in terms of usable bits available for the secret key. This security parameter s can be varied by the communicating parties based on practical considerations. In the second part of the paper, we apply the probabilistic model to BB84 and show how it can be used to improve the efficiency of BB84.

KW - Efficiency improvement

KW - Probabilistic model for QKD

KW - Quantum key distribution

UR - http://www.scopus.com/inward/record.url?scp=84961162632&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84961162632&partnerID=8YFLogxK

U2 - 10.1504/IJSN.2016.075075

DO - 10.1504/IJSN.2016.075075

M3 - Article

VL - 11

SP - 37

EP - 47

JO - International Journal of Security and Networks

JF - International Journal of Security and Networks

SN - 1747-8405

IS - 1-2

ER -