Experimental realization of three quantum key distribution protocols

Classical computers allow security of cryptographic protocols based on the mathematical complexity of encoding functions and the shared key. This implies that high computational power can have a positive outcome in breaking cryptographic protocols that employ classical computers. Quantum machines claim to possess such power. Two parties interested in communicating with each other take up the process of measuring entangled states in order to construct a secret key which is safeguarded against an eavesdropper capable of performing quantum operations. At first, experimental verification of the BB84 protocol using three bases has been performed in this paper, out of which sub-cases have been considered based on whether or not Eve has attempted an attack. The following part includes experimental realization of the B92 protocol which was introduced by Charles Bennett in the year 1992. Possibility of an Eve’s attack is considered and implemented. Succeeding part relies on experimental implementation of the protocol that was introduced by Acin, Massar and Pironio in the year 2006 (New J Phys 8:126, 2006). All the implementations have been done using the IBM Quantum Experience platform.

[1]  Jane E. Nordholt,et al.  Refining Quantum Cryptography , 2011, Science.

[2]  Li Jing,et al.  Quantum cloning machines and the applications , 2013, 1301.2956.

[3]  Norbert Lutkenhaus,et al.  Security proof of the unbalanced phase-encoded Bennett-Brassard 1984 protocol , 2012, 1206.6668.

[4]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[5]  S. Massar,et al.  Efficient quantum key distribution secure against no-signalling eavesdroppers , 2006, quant-ph/0605246.

[6]  J. Bell On the Einstein-Podolsky-Rosen paradox , 1964 .

[7]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[8]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[9]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[10]  Fibirova Jana,et al.  Profit-Sharing – A Tool for Improving Productivity, Profitability and Competitiveness of Firms? , 2013 .

[11]  David McMahon Quantum Computing Explained , 2007 .

[12]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[13]  Naya Nagy,et al.  Quantum Cryptography on IBM QX , 2019, 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS).

[14]  Andrew J. Shields,et al.  Long-distance quantum key distribution secure against coherent attacks , 2017 .

[15]  Diego Garc'ia-Mart'in,et al.  Five Experimental Tests on the 5-Qubit IBM Quantum Computer , 2017, 1712.05642.

[16]  Anirban Pathak,et al.  Elements of Quantum Computation and Quantum Communication , 2013 .

[17]  A. Shimony,et al.  Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .

[18]  Marco Lucamarini,et al.  Experimental quantum key distribution beyond the repeaterless secret key capacity , 2019, Nature Photonics.