Time-polarization coding in quantum cryptography

被引:0
|
作者
Sellami Ali
机构
[1] Shaqra University,Faculty of Computer Science and Information Technology
来源
关键词
Quantum key distribution; Quantum cryptography; Optical communication; Photonic network;
D O I
暂无
中图分类号
学科分类号
摘要
We present a quantum key distribution (QKD) method that allows us to demonstrate practical quantum cryptography. It is used for obtaining the cryptographic key to encode the information communicated between to legitimate parties. It generally relates to a secured key sharing method and system between a plurality of transmitters and a plurality of receivers, more particularly to a system and method of QKD between transmitters and receivers. The aspect of the method is a QKD system capable of forming the first signals with different phases or polarization and the second signals with different delay time. The transmitter sends the two signals to share the key with receiver. The first signal is generated in different phases or polarization to protect the transmission channel and to be the reference time for second signal. The state of first signal and the delay time between the first signal and second signal is the key. The method leads to increase the length of the shared key. This method is used to implement the practical QKD system that can be used for switching between our protocol and BB84 protocol in optical fiber (one-way system) and free space setups with unconditionally security. Secure keys generated by the QKD network are managed in the key management layer by key management agents (KMAs), and used to encrypt the data and send it to receivers. The proposed schemes aimed to provide a secure end to end communication.
引用
收藏
相关论文
共 50 条
  • [1] Time-polarization coding in quantum cryptography
    Ali, Sellami
    [J]. OPTICAL AND QUANTUM ELECTRONICS, 2016, 48 (12)
  • [2] Multiplex quantum cryptography based on time coding without interferometers
    Molotkov, SN
    [J]. JETP LETTERS, 2004, 79 (09) : 445 - 449
  • [3] Multiplex quantum cryptography based on time coding without interferometers
    S. N. Molotkov
    [J]. Journal of Experimental and Theoretical Physics Letters, 2004, 79 : 445 - 449
  • [4] Vulnerability of quantum cryptography with phase–time coding under attenuation conditions
    D. A. Kronberg
    [J]. Theoretical and Mathematical Physics, 2023, 214 : 121 - 131
  • [5] QUANTUM CRYPTOGRAPHY WITHOUT CONJUGATE CODING
    PHOENIX, SJD
    [J]. PHYSICAL REVIEW A, 1993, 48 (01): : 96 - 102
  • [6] Quantum-safe cryptography: crossroads of coding theory and cryptography
    Jiabo Wang
    Ling Liu
    Shanxiang Lyu
    Zheng Wang
    Mengfan Zheng
    Fuchun Lin
    Zhao Chen
    Liuguo Yin
    Xiaofu Wu
    Cong Ling
    [J]. Science China Information Sciences, 2022, 65
  • [7] Quantum-safe cryptography:crossroads of coding theory and cryptography
    Jiabo WANG
    Ling LIU
    Shanxiang LYU
    Zheng WANG
    Mengfan ZHENG
    Fuchun LIN
    Zhao CHEN
    Liuguo YIN
    Xiaofu WU
    Cong LING
    [J]. Science China(Information Sciences), 2022, 65 (01) : 95 - 115
  • [8] Quantum-safe cryptography: crossroads of coding theory and cryptography
    Wang, Jiabo
    Liu, Ling
    Lyu, Shanxiang
    Wang, Zheng
    Zheng, Mengfan
    Lin, Fuchun
    Chen, Zhao
    Yin, Liuguo
    Wu, Xiaofu
    Ling, Cong
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (01)
  • [9] Complete Bell state measurement realized utilizing time-polarization hyperentanglment
    Williams, Brian P.
    Humble, Travis S.
    [J]. 2016 CONFERENCE ON LASERS AND ELECTRO-OPTICS (CLEO), 2016,
  • [10] Vulnerability of quantum cryptography with phase-time coding under attenuation conditions
    Kronberg, D. A.
    [J]. THEORETICAL AND MATHEMATICAL PHYSICS, 2023, 214 (01) : 121 - 131