Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation
Quantum cryptography is a well-stated field within quantum applications where quantum information is used to set secure communications, authentication, and secret keys. Now used in quantum devices with those purposes, particularly Quantum Key Distribution (QKD), which proposes a secret key between t...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-04-01
|
Series: | Symmetry |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-8994/14/4/713 |
_version_ | 1797434232897798144 |
---|---|
author | Carlos Cardoso-Isidoro Francisco Delgado |
author_facet | Carlos Cardoso-Isidoro Francisco Delgado |
author_sort | Carlos Cardoso-Isidoro |
collection | DOAJ |
description | Quantum cryptography is a well-stated field within quantum applications where quantum information is used to set secure communications, authentication, and secret keys. Now used in quantum devices with those purposes, particularly Quantum Key Distribution (QKD), which proposes a secret key between two parties free of effective eavesdropping, at least at a higher level than classical cryptography. The best-known quantum protocol to securely share a secret key is the BB84 one. Other protocols have been proposed as adaptations of it. Most of them are based on the quantum indeterminacy for non-orthogonal quantum states. Their security is commonly based on the large length of the key. In the current work, a BB84-like procedure for QKD based on double quantum teleportation allows the sharing of the key statement using several parties. Thus, the quantum bits of information are assembled among three parties via entanglement, instead of travelling through a unique quantum channel as in the traditional protocol. Asymmetry in the double teleportation plus post-measurement retains the secrecy in the process. Despite requiring more complex control and resources, the procedure dramatically reduces the probability of success for an eavesdropper under individual attacks, because of the ignorance of the processing times in the procedure. Quantum Bit Error Rate remains in the acceptable threshold and it becomes configurable. The article depicts the double quantum teleportation procedure, the associated control to introduce the QKD scheme, the analysis of individual attacks performed by an eavesdropper, and a brief comparison with other protocols. |
first_indexed | 2024-03-09T10:28:19Z |
format | Article |
id | doaj.art-8a679c9dad0644df922c474ad49f93c8 |
institution | Directory Open Access Journal |
issn | 2073-8994 |
language | English |
last_indexed | 2024-03-09T10:28:19Z |
publishDate | 2022-04-01 |
publisher | MDPI AG |
record_format | Article |
series | Symmetry |
spelling | doaj.art-8a679c9dad0644df922c474ad49f93c82023-12-01T21:28:26ZengMDPI AGSymmetry2073-89942022-04-0114471310.3390/sym14040713Shared Quantum Key Distribution Based on Asymmetric Double Quantum TeleportationCarlos Cardoso-Isidoro0Francisco Delgado1Tecnologico de Monterrey, School of Engineering and Sciences, Monterrey 64849, MexicoTecnologico de Monterrey, School of Engineering and Sciences, Atizapán 52926, MexicoQuantum cryptography is a well-stated field within quantum applications where quantum information is used to set secure communications, authentication, and secret keys. Now used in quantum devices with those purposes, particularly Quantum Key Distribution (QKD), which proposes a secret key between two parties free of effective eavesdropping, at least at a higher level than classical cryptography. The best-known quantum protocol to securely share a secret key is the BB84 one. Other protocols have been proposed as adaptations of it. Most of them are based on the quantum indeterminacy for non-orthogonal quantum states. Their security is commonly based on the large length of the key. In the current work, a BB84-like procedure for QKD based on double quantum teleportation allows the sharing of the key statement using several parties. Thus, the quantum bits of information are assembled among three parties via entanglement, instead of travelling through a unique quantum channel as in the traditional protocol. Asymmetry in the double teleportation plus post-measurement retains the secrecy in the process. Despite requiring more complex control and resources, the procedure dramatically reduces the probability of success for an eavesdropper under individual attacks, because of the ignorance of the processing times in the procedure. Quantum Bit Error Rate remains in the acceptable threshold and it becomes configurable. The article depicts the double quantum teleportation procedure, the associated control to introduce the QKD scheme, the analysis of individual attacks performed by an eavesdropper, and a brief comparison with other protocols.https://www.mdpi.com/2073-8994/14/4/713quantum informationquantum cryptographyQuantum Key DistributionBB84 protocolteleportation |
spellingShingle | Carlos Cardoso-Isidoro Francisco Delgado Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation Symmetry quantum information quantum cryptography Quantum Key Distribution BB84 protocol teleportation |
title | Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation |
title_full | Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation |
title_fullStr | Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation |
title_full_unstemmed | Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation |
title_short | Shared Quantum Key Distribution Based on Asymmetric Double Quantum Teleportation |
title_sort | shared quantum key distribution based on asymmetric double quantum teleportation |
topic | quantum information quantum cryptography Quantum Key Distribution BB84 protocol teleportation |
url | https://www.mdpi.com/2073-8994/14/4/713 |
work_keys_str_mv | AT carloscardosoisidoro sharedquantumkeydistributionbasedonasymmetricdoublequantumteleportation AT franciscodelgado sharedquantumkeydistributionbasedonasymmetricdoublequantumteleportation |