An improved coding method of quantum key distribution protocols based on Fibonacci-valued OAM entangled states

We propose an improved coding method of quantum key distribution protocols based on a recently proposed (QKD) protocol using Fibonacci-valued OAM entangled states. To be exact, we define a new class of Fibonacci-matrix coding and Fibonacci-matrix representation and show how they can be used to extend and improve the original protocols. Compared with the original protocols, our protocol not only greatly improves the encoding efficiency but also has verifiability.

[1]  A. Stakhov Fibonacci matrices, a generalization of the “Cassini formula”, and a new coding theory , 2006 .

[2]  Jian Shen,et al.  A secure cloud-assisted urban data sharing framework for ubiquitous-cities , 2017, Pervasive Mob. Comput..

[3]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[4]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[5]  Jian Shen,et al.  An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data , 2017, IEEE Transactions on Information Forensics and Security.

[6]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[7]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[8]  Xingming Sun,et al.  Digital forensics of Microsoft Office 2007–2013 documents to prevent covert communication , 2015, Journal of Communications and Networks.

[9]  Xiaodong Liu,et al.  A speculative approach to spatial-temporal efficiency with multi-objective optimization in a heterogeneous cloud environment , 2016, Secur. Commun. Networks.

[10]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[11]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[12]  Masahide Sasaki,et al.  Progress towards practical device-independent quantum key distribution with spontaneous parametric down-conversion sources, on-off photodetectors, and entanglement swapping , 2015, 1512.06876.

[13]  H. Vogel A better way to construct the sunflower head , 1979 .

[14]  Matrix arithmetic based on Fibonacci matrices , 2001 .

[15]  Stefano Pironio,et al.  Necessary detection efficiencies for secure quantum key distribution and bound randomness , 2016 .

[16]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[17]  Zhangjie Fu,et al.  Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data , 2017, IEEE Transactions on Information Forensics and Security.

[18]  Ling-An Wu,et al.  Measurement-device-independent entanglement-based quantum key distribution , 2016 .

[19]  Casey Fitzpatrick,et al.  Security in the Multi-Dimensional Fibonacci Protocol , 2015 .

[20]  D. Simon,et al.  High-capacity quantum Fibonacci coding for key distribution , 2013 .

[21]  T. Aaron Gulliver,et al.  A new class of Fibonacci sequence based error correcting codes , 2017, Cryptography and Communications.

[22]  Sateesh Addepalli,et al.  Fog computing and its role in the internet of things , 2012, MCC '12.

[23]  Shuang Wang,et al.  Experimental demonstration on the deterministic quantum key distribution based on entangled photons , 2016, Scientific Reports.