Open Access   Article Go Back

Quantum Mechanics Inside Quantum Communication and Quantum Bit Error Rate(QBER)

Susmita Nayek1 , Utpal Roy2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-01 , Page no. 237-244, Jan-2019

Online published on Jan 20, 2019

Copyright © Susmita Nayek, Utpal Roy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Susmita Nayek, Utpal Roy, “Quantum Mechanics Inside Quantum Communication and Quantum Bit Error Rate(QBER),” International Journal of Computer Sciences and Engineering, Vol.07, Issue.01, pp.237-244, 2019.

MLA Style Citation: Susmita Nayek, Utpal Roy "Quantum Mechanics Inside Quantum Communication and Quantum Bit Error Rate(QBER)." International Journal of Computer Sciences and Engineering 07.01 (2019): 237-244.

APA Style Citation: Susmita Nayek, Utpal Roy, (2019). Quantum Mechanics Inside Quantum Communication and Quantum Bit Error Rate(QBER). International Journal of Computer Sciences and Engineering, 07(01), 237-244.

BibTex Style Citation:
@article{Nayek_2019,
author = {Susmita Nayek, Utpal Roy},
title = {Quantum Mechanics Inside Quantum Communication and Quantum Bit Error Rate(QBER)},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {07},
Issue = {01},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {237-244},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=625},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=625
TI - Quantum Mechanics Inside Quantum Communication and Quantum Bit Error Rate(QBER)
T2 - International Journal of Computer Sciences and Engineering
AU - Susmita Nayek, Utpal Roy
PY - 2019
DA - 2019/01/20
PB - IJCSE, Indore, INDIA
SP - 237-244
IS - 01
VL - 07
SN - 2347-2693
ER -

           

Abstract

The quantum cryptography has changed the landscape of the conventional cryptography theory and the field of security itself. The Quantum cryptography differs from the classical cryptography in the sense that data and the information are kept secret by the properties of quantum mechanics without importing any extra formulation. In case of classical cryptography the security is based on the conjecture difficulty of factoring and computing a special mathematical function. The first Quantum Key Distribution (QKD) protocol was proposed by C H Bennet and Brassard in 1984[1](BB84). In course of time many variants of QKD protocols have been proposed, all are basically based more or less in the same principle. In this paper role and the beauty of the Quantum Mechanics behind the QKD protocol have been unfolded and explained. The pros-and cons of the protocol have been analyzed in details. The quality of the QKD protocol is measured through a factor called QBER (Quantum Bit Error Rate). The bit error rate is an essential phenomena during the transmission of quantum bit along the quantum channel. Both quantum mechanical and mathematical analysis of QBER have been discussed in the paper. An empirical formula for QBER has been proposed too.

Key-Words / Index Term

Quantum mechanics, quantum cryptography, light(photon), eavesdropping, quantum bit error rate(QBER)

References

[1]. C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and coin tossing,” Proc. of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175-179, 1984.
[2]. [Ekert, A.k. “Quantum cryptography based on Bell‟s Theorem”, Physical Review Letters vol.67.no6 5th august 1991, pp.661-663.
[3]. D.Mayers, Journal. of ACM 48, 351 (2001), preliminary version in Mayers, D. Advances in Cryptology-Proc. Crypto 96, vol 1109 of Lecture Notes in Computer Science, Kobiltz, N.Ed.(Springer-Verlag, New York, 1996) pp. 343-357.
[4]. E.Biham, M.Boyer, P.O.Boykin, T.Mor and V.Roychowdhury, in Proc of the thirty second annual ACM symposium on theory of computing (Portland, Oregon, United States, 2000), pp. 715-724
[5]. H.K.Lo and H.F.Chau Science 283, 2050 (1999)
[6]. P.W.Shor and J.Preskill, Phys.Rev. Lett 85,441(2000), arXiv: quant-ph/0003004.
[7]. D.Gottesman, H.K.Lo, N.Liikenhaus and J.Preksill, „Quantum Information and Computation 5, 325 (2004), arXiv: quant-ph/0212066.
[8]. H.Inamori, N.Liikenhaus, and D.Mayers (2001), arXiv.quant-ph/0107017.
[9]. W.Y.Hwang, Phys.Rev. Lett. 91, 057901 (2003).
[10]. H.K.Lo, X.Ma and K.Chen, Phys.Rev. Lett 94, 230504 (2005)
[11]. H.k.Lo, in Proc of IEEE International Symposium on Information Theory (ISIT) (2004), p.137, arXiv.quant-ph/0509076.
[12]. Pradeep Kumar and A. Prabhakar,Bit error rates in a frequency coded quantum key distribution system,Optics Communications 282 (2009)3827-3833.
[13]. C.H. Bennett Quantum cryptography using any two non orthogonal states, Physical Review Letters 68 (21) (1992) 3121-3124
[14]. Mart Haitjema, “A Survey of the Prominent Quantum Key Distribution Protocols “http://www.cs.wustl.edu/~jain/cse571-07/ftp/quantum/index.html#b92
[15]. Scarani, A.Acin, Ribordy, G.Gisin.N.”Quantum Cryptography protocols robust against Photon number Splitting attack.” Physical Review Letters, vol.92.2004 http://www.qci.jst.go.jp/eqsi03/program/papers/O26-Scarani.pdf
[16]. N.Gisin. talk presented at the workshop on Quantum Computation, Torino. July 1997; D.bruss. Physical review letter. Vol 81.no3018 (1998)
[17]. Bechmann-Pasquinucci, H and Gisin.N “Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography.” Physical Review Letter A59, 4238-4248; (1999).
[18]. N.Gisin, G.Ribordy, W.Tittel, H.Zbinden, “Quantum Cryptography”, Review of Modern Physics, Vol 74 No 1, pp145-194, 2002
[19]. D.Stucki et al., Appl. Phys. Lett.87, 194108 (2005)
[20]. [Gisin N, Ribordy G, Zbinden H, Stucki D, Brunner N and Scarani V 2004, “ Towards practical and fast quantum cryptography”, arXiv:quant-ph/0411022
[21]. K.Inoue, E.Waks and Y.Yamanoto.” Differential-phase-shift quantum key distribution using coherent light.” Phys.Rev. A 68.022317 (2003).
[22]. E.Waks, H.Takesue and Y. Yamamoto, “Security of differential-Phase-Shift quantum key distribution against individual attacks.” Phys.Rev.A 73,012344 (2006).
[23]. Muhammad Mubashir Khan et al. “High error-rate quantum key distribution for long distance communication” New J.Phys. 11 063043 http://iopscience.iop.org/1367-2630/11/6/063043/
[24]. Eduin Esteban, Hernandez Serna, “Quantum Key Distribution protocol with private- public key” arXiv: 0908.2146v4 quant-ph 12th may 2012.
[25] Hitesh Singh,D.L. Gupta,A. K. Singh,Quantum Key Distribution Protocols:AReview,IOCR Journal of Computer Engineering(IOSR-JCE),e-ISSN:2278-0661,p-ISSN:2279-8727 Volume 16,Isuue 2,Ver.XI(Mar-Apr.2014),PP 01-09
[26] M. Lopes and N. Sarwade, Cryptography from Quantum Mechanical View Point, Int. Jour. Of Cryptography and Information Security, Vol. 4. No.2 Page 13(2014).
[27] L. Lydersen, Practical security of quantumcryptography, Ph.D. thesis, Norwegian University ofScience and Technology, 2011.
[28] M. E. Rifai, Quantum secure communication usingpolarization hopping multi-stage protocols, Ph.Dthesis, University of Oklahoma, 2016.