Quantum Key Distribution Protocol for Secure Fiber Optic Communication

  IJRES-book-cover  International Journal of Recent Engineering Science (IJRES)          
  
© 2024 by IJRES Journal
Volume-11 Issue-3
Year of Publication : 2024
Authors : Ezeilo Ifeoma Kelechukwu, Asianuba Ifeoma
DOI : 10.14445/23497157/IJRES-V11I3P105

How to Cite?

Ezeilo Ifeoma Kelechukwu, Asianuba Ifeoma, "Quantum Key Distribution Protocol for Secure Fiber Optic Communication," International Journal of Recent Engineering Science, vol. 11, no. 3, pp. 48-55, 2024. Crossref, https://doi.org/10.14445/23497157/IJRES-V11I3P105

Abstract
Currently, secure communication is crucial in the digital era since sensitive information is always in transit and data moves freely. Despite their effectiveness, traditional encryption techniques are not impervious to the changing threat environment. Clearly, one surefire method of ensuring security for upcoming fiber communication networks is through quantum key distribution. The Quantum Key Distribution (QKD) cryptographic protocol secures communication channels by utilizing concepts from quantum mechanics. Key distribution security is the goal of the Quantum Key Distribution Protocol for Secure Fiber Communication, quantum key generation, detection of eavesdropping, perfect secrecy, information-theoretic security, security against quantum computers, integration with classical cryptography and compatibility with fiber optic communication. Key Distribution Security's main goal of QKD is to transfer cryptographic keys between two parties in a secure manner. The application and advantages of Quantum Key Distribution (QKD) techniques for improving fiber optic communication security are examined in this paper. QKD exploits principles of quantum physics to establish secure keys between participants, minimizing cyber dangers in fiber optic networks. In order to secure data transfer, the paper examines the theoretical foundation, real-world use, and difficulties associated with QKD techniques. It ends with some thoughts on how QKD can develop secure communication technology in the future.

Keywords
Fiber optic communication, Key distribution, Security, Qubits, Quantum.

Reference
[1] Rotem Arnon-Friedman, and Felix Leditzky, “Upper Bounds on Device-Independent Quantum Key Distribution Rates and a Revised Peres Conjecture,” IEEE Transactions on Information Theory, vol. 67, no. 10, pp. 6606–6618, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] I.B. Asinuba, Optical Fiber Communication, University of Port Harcourt Nigeria, 2024.
[3] S. Athanassias, “Securing the Future: The Rise of Quantum Communication,” National and Kapodistrian Universities of Athens, Greece, 2023.
[4] Charles H. Bennett, Gilles Brassard, and Jean-Marc Robert, “Privacy Amplification by Public Discussion,” SIAM Journal on Computing, vol. 17, no. 2, pp. 210–229, 1988.
[CrossRef] [Google Scholar] [Publisher Link]
[5] B.B. Blinov et al., “Observation of Entanglement between a Single Trapped Atom and a Single Photon,” Nature, vol. 428, pp. 153–157, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Chenghao Lao et al., “Quantum Decoherence of Dark Pulses in Optical Microresonators,” Nature Communications, vol. 14, pp. 1-8, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] B.G. Christensen et al., “Detection-Loophole-Free Test of Quantum Nonlocality, and Applications,” Physical Review Letters, vol. 111, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Daniele Cozzolino et al., “High-Dimensional Quantum Communication: Benefits, Progress, and Future Challenges,” Advanced Quantum Technologies, vol. 2, no. 12, pp. 1-17, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Eric A. Dauler et al., “Photon-Number-Resolution with Sub-30-ps Timing Using Multi-Element Superconducting Nanowire Single Photon Detectors,” Journal of Modern Optics, vol. 56, pp. 364–373, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[10] A. Einstein, B. Podolsky, and N. Rosen, “Can Quantum-Mechanical Description of Physical Reality be Considered Complete?,” Physical Review, vol. 47, no. 10, pp. 777–780, 1935.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Ilias P. Galanis, Ilias K. Savvas, and Georgia Garani, “Experimental Approach of the Quantum Volume on Different Quantum Computing Devices,” The 14th International Symposium on Intelligent Distributed Computing, vol. 1026, pp. 467-476, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Nicolas Gisin, and Rob Thew, “Quantum Communication,” Nature Photonics, vol. 1, pp. 165–171, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Marissa Giustina et al., “Bell Violation Using Entangled Photons without the Fair-Sampling Assumption,” Nature, vol. 497, pp. 227–230, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Robert H. Hadfield, “Single-Photon Detectors for Optical Quantum Information Applications,” Nature Photonics, vol. 3, pp. 696–705, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[15] M. Hosseini et al., “High Efficiency Coherent Optical Memory with Warm Rubidium Vapour,” Nature Communications, vol. 2, pp. 1-5, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Rahul Jain, Carl A. Miller, and Yaoyun Shi, “Parallel Device-Independent Quantum Key Distribution,” IEEE Transactions on Information Theory, vol. 66, pp. 5567–5584, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Pierre Jobez et al., “Coherent Spin Control at Quantum Levek in an Ensemble-Based Optical Memory,” Physical Review Letters, vol. 114, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Eneet Kaur, Mark M. Wilde, and Andreas Winter, “Fundamental Limits on Key Rates in Device-Independent Quantum Key Distribution,” New Journal of Physics, vol. 22, pp. 1-30, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Lijun Ma, Oliver Slattery, and Xiao Tang, “Optical Quantum Memory and Its Applications in Quantum Communication Systems,” Journal of Research of the National Institute of Standards and Technology, vol. 125, pp. 1-13, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[20] M. Lucamarini et al., “Overcoming the Rate-Distance Limit of Quantum Key Distribution without Quantum Repeaters,” Nature, vol. 557, pp. 400–403, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Norbert Lütkenhaus, “Security against Eavesdropping Attacks in Quantum Cryptography,” Physical Review A, vol. 54, no. 1, pp. 97–111, 1996.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Vadim Makarov, and Dag R. Hjelme, “Faked States Attack on Quantum Cryptosystems,” Journal of Modern Optics, vol. 52, no. 5, pp. 691–705, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Vadim Makarov, Andrey Anisimov, and Johannes Skaar, “Effects of Detector Efficiency Mismatch on Security of Quantum Cryptosystems,” Physical Review A, vol. 74, no. 2, 2006.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Hao-Kun Mao et al., “High Performance Reconciliation for Practical Quantum Key Distribution Systems,” Optical and Quantum Electronics, vol. 54, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Michele Masini, Stefano Pironio, and Erik Woodhead, “Simple and Practical DIQKD Security Analysis via BB84-Type Uncertainty Relations and Pauli Correlation Constraints,” Quantum, vol. 6, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Nikolai Miklin et al., “Exponentially Decreasing Critical Detection Efficiency for Any Bell Inequality,” Physical Review Letters, vol. 129, no. 23, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[27] A. Muller et al., “‘Plug and Play’ Systems for Quantum Cryptography,” Applied Physics Letters, vol. 70, pp. 793-795, 1997.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Margarida Pereira et al., “Quantum Key Distribution with Correlated Sources,” Science Advances, vol. 6, no. 37, pp. 1-16, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[29] John Preskill, “Quantum Computing and the Entanglement Frontier,” arXiv, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Ignatius W. Primaatmaja et al., “Security of Device-Independent Quantum Key Distribution Protocols: A Review,” arXiv, vol. 7, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Philip Purpura, Security and Loss Prevention: An Introduction, Elsevier Science, 2013.
[Google Scholar] [Publisher Link]
[32] Philip Sibson et al., “Integrated Silicon Photonics for High-Speed Quantum Key Distribution,” Optica, vol. 4, no. 2, pp. 172–177, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[33] Nuno A. Silva et al., “Tunable Light Fluids using Quantum Atomic Optical Systems,” Third International Conference on Applications of Optics and Photonics, vol. 10453, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Marco Tomamichel, Roger Colbeck, and Renato Renner, “A Fully Quantum Asymptotic Equipartition Property,” IEEE Transactions on Information Theory, vol. 55, no. 12, pp. 5840-5847, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Paul D. Townsend, “Quantum Cryptography on Optical Fiber Networks,” Optical Fiber Technology, vol. 4, no. 4, pp. 345-370, 1998.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Thomas Vidick, “Parallel DIQKD from Parallel Repetition,” arXiv, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[37] M.A. Vorontsov, G.W. Carhart, and J.C. Ricklin “Adaptive Phase-Distortion Correction Based on Parallel Gradient-Descent Optimization,” Optics Letters, vol. 22, pp. 907–909, 1997.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Kejin Wei et al., “High-Speed Measurement-Device-Independent Quantum Key Distribution with Integrated Silicon Photonics,” Physical Review X, vol. 10, no. 3, pp. 1-11, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[39] Lixing You, “Superconducting Nanowire Single-Photon Detectors for Quantum Information,” Nanophotonics, vol. 9, pp. 2673–2692, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[40] Yanbao Zhang, Honghao Fu, and Emanuel Knill, “Efficient Randomness Certification by Quantum Probability Estimation,” Physical Review Research, vol. 2, no. 1, pp. 1-26, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Jian Zhao, Yaping Liu, and Tianhua Xu, “Advanced DSP for Coherent Optical Fiber Communication,” Applied Sciences, vol. 9, no. 19, pp. 1-20, 2019.
[CrossRef] [Google Scholar] [Publisher Link]