CINXE.COM

{"title":"Eight-State BB84: A C# Simulation","authors":"Liliana Zisu","volume":148,"journal":"International Journal of Computer and Information Engineering","pagesStart":192,"pagesEnd":196,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/10010225","abstract":"<p>The first and best known quantum protocol BB84, whose security is unconditional allows the transmission of a key with a length equal to that of the message. This key used with an encryption algorithm leads to an unbreakable cryptographic scheme. Despite advantages the protocol still can be improved in at least two aspects: its efficiency which is of about 50%, only half of the photons transmitted are used to create the encryption key and the second aspect refers to the communication that takes place on the classic channel, as it must be reduced or even eliminated. The paper presents a method that improves the two aspects of the BB84 protocol by using quantum memory and eight states of polarization. The implementation of both the proposed method and the BB84 protocol was done through a C# application.<\/p>\r\n","references":"[1]\tC. H. Bennett, G. Brassard, \"Quantum Cryptography: Public key distribution and coin tossing\", International Conference on Computers, Systems & Signal Processing, Bangalore, India, 10-12 December 1984, pp. 175-179.\r\n[2]\tP. Shor, \"Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer\", SIAM Journal of Computing, 26, 1997, pp. 1484-1509.\r\n[3]\tA. K. Ekert, \"Quantum cryptography based on Bell's theorem\", Physical Review Letters, vol. 67, no. 6, 5 August 1991, pp. 661 - 663.\r\n[4]\tC. H. Bennett, \"Quantum cryptography using any two nonorthogonal states \", Phys. Rev. Lett. 68, 1992, pp. 3121-3124.\r\n[5]\tH. Bechmann-Pasquinucci, N. Gisin, \"Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography\" Phys. Rev. A 59, 4238-4248, 1999.\r\n[6]\tD. Enzer, P. Hadley, R. Gughes, C. Peterson, P. Kwiat, \"Entangled-photon six-state quantum cryptography\", New Journal of Physics, 2002, pp 45.1-45.8.\r\n[7]\tA. Scarani, A. Acin, G. Ribordy, N. Gisin, \"Quantum cryptography protocols robust against photon number splitting attacks.\", Physical Review Letters, vol. 92, 2004.\r\n[8]\tD. Mayers, \u201cUnconditional security in quantum cryptography,\u201d Journal of the ACM, vol. 48, no. 3, pp. 351\u2013406, May 2001.","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 148, 2019"}