Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation

Quantum cryptography is a well-stated field within quantum applications where quantum information is used to set secure communications, authentication, and secret keys. Now used in quantum devices with those purposes, particularly Quantum Key Distribution (QKD), which proposes a secret key between t...

Full description

Bibliographic Details
Main Authors: Carlos Cardoso-Isidoro, Francisco Delgado
Format: Article
Language:English
Published: MDPI AG 2022-04-01
Series:Symmetry
Subjects:
Online Access:https://www.mdpi.com/2073-8994/14/4/713
_version_ 1797434232897798144
author Carlos Cardoso-Isidoro
Francisco Delgado
author_facet Carlos Cardoso-Isidoro
Francisco Delgado
author_sort Carlos Cardoso-Isidoro
collection DOAJ
description Quantum cryptography is a well-stated field within quantum applications where quantum information is used to set secure communications, authentication, and secret keys. Now used in quantum devices with those purposes, particularly Quantum Key Distribution (QKD), which proposes a secret key between two parties free of effective eavesdropping, at least at a higher level than classical cryptography. The best-known quantum protocol to securely share a secret key is the BB84 one. Other protocols have been proposed as adaptations of it. Most of them are based on the quantum indeterminacy for non-orthogonal quantum states. Their security is commonly based on the large length of the key. In the current work, a BB84-like procedure for QKD based on double quantum teleportation allows the sharing of the key statement using several parties. Thus, the quantum bits of information are assembled among three parties via entanglement, instead of travelling through a unique quantum channel as in the traditional protocol. Asymmetry in the double teleportation plus post-measurement retains the secrecy in the process. Despite requiring more complex control and resources, the procedure dramatically reduces the probability of success for an eavesdropper under individual attacks, because of the ignorance of the processing times in the procedure. Quantum Bit Error Rate remains in the acceptable threshold and it becomes configurable. The article depicts the double quantum teleportation procedure, the associated control to introduce the QKD scheme, the analysis of individual attacks performed by an eavesdropper, and a brief comparison with other protocols.
first_indexed 2024-03-09T10:28:19Z
format Article
id doaj.art-8a679c9dad0644df922c474ad49f93c8
institution Directory Open Access Journal
issn 2073-8994
language English
last_indexed 2024-03-09T10:28:19Z
publishDate 2022-04-01
publisher MDPI AG
record_format Article
series Symmetry
spelling doaj.art-8a679c9dad0644df922c474ad49f93c82023-12-01T21:28:26ZengMDPI AGSymmetry2073-89942022-04-0114471310.3390/sym14040713Shared Quantum Key Distribution Based on Asymmetric Double Quantum TeleportationCarlos Cardoso-Isidoro0Francisco Delgado1Tecnologico de Monterrey, School of Engineering and Sciences, Monterrey 64849, MexicoTecnologico de Monterrey, School of Engineering and Sciences, Atizapán 52926, MexicoQuantum cryptography is a well-stated field within quantum applications where quantum information is used to set secure communications, authentication, and secret keys. Now used in quantum devices with those purposes, particularly Quantum Key Distribution (QKD), which proposes a secret key between two parties free of effective eavesdropping, at least at a higher level than classical cryptography. The best-known quantum protocol to securely share a secret key is the BB84 one. Other protocols have been proposed as adaptations of it. Most of them are based on the quantum indeterminacy for non-orthogonal quantum states. Their security is commonly based on the large length of the key. In the current work, a BB84-like procedure for QKD based on double quantum teleportation allows the sharing of the key statement using several parties. Thus, the quantum bits of information are assembled among three parties via entanglement, instead of travelling through a unique quantum channel as in the traditional protocol. Asymmetry in the double teleportation plus post-measurement retains the secrecy in the process. Despite requiring more complex control and resources, the procedure dramatically reduces the probability of success for an eavesdropper under individual attacks, because of the ignorance of the processing times in the procedure. Quantum Bit Error Rate remains in the acceptable threshold and it becomes configurable. The article depicts the double quantum teleportation procedure, the associated control to introduce the QKD scheme, the analysis of individual attacks performed by an eavesdropper, and a brief comparison with other protocols.https://www.mdpi.com/2073-8994/14/4/713quantum informationquantum cryptographyQuantum Key DistributionBB84 protocolteleportation
spellingShingle Carlos Cardoso-Isidoro
Francisco Delgado
Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation
Symmetry
quantum information
quantum cryptography
Quantum Key Distribution
BB84 protocol
teleportation
title Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation
title_full Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation
title_fullStr Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation
title_full_unstemmed Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation
title_short Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation
title_sort shared quantum key distribution based on asymmetric double quantum teleportation
topic quantum information
quantum cryptography
Quantum Key Distribution
BB84 protocol
teleportation
url https://www.mdpi.com/2073-8994/14/4/713
work_keys_str_mv AT carloscardosoisidoro sharedquantumkeydistributionbasedonasymmetricdoublequantumteleportation
AT franciscodelgado sharedquantumkeydistributionbasedonasymmetricdoublequantumteleportation