Multi-Bits Transfer Based on the Quantum Three-Stage Protocol with Quantum Error Correction Codes

This paper presents a multi-bits transfer quantum protocol based on the three-stage quantum cryptography in which both parties use their own secret keys. In addition, a quantum three-stage protocol emerging with quantum error correction code is proposed. Finally, a cost comparison between the multi-bits transfer quantum protocol and the original three-stage quantum cryptography protocol is analyzed to show that our protocol has better performance.

[1]  J. Neumann Mathematical Foundations of Quantum Mechanics , 1955 .

[2]  Frank Gaitan Quantum Error Correction and Fault Tolerant Quantum Computing , 2008 .

[3]  Sunghwan Kim,et al.  Construction and complement circuit of a quantum stabilizer code with length 7 , 2016, 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN).

[4]  Daniel Gottesman,et al.  Stabilizer Codes and Quantum Error Correction , 1997, quant-ph/9705052.

[5]  Fibirova Jana,et al.  Profit-Sharing – A Tool for Improving Productivity, Profitability and Competitiveness of Firms? , 2013 .

[6]  Sunghwan Kim,et al.  Quantum stabilizer codes construction from Hermitian self-orthogonal codes over GF(4) , 2018, Journal of Communications and Networks.

[7]  Lov K. Grover Quantum Mechanics Helps in Searching for a Needle in a Haystack , 1997, quant-ph/9706033.

[8]  I. Chuang,et al.  Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .

[9]  Sunghwan Kim,et al.  Quantum Key Distribution Protocol Based on Modified Generalization of Deutsch-Jozsa Algorithm in d-level Quantum System , 2018, International Journal of Theoretical Physics.

[10]  Shor,et al.  Scheme for reducing decoherence in quantum computer memory. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[11]  Steane,et al.  Error Correcting Codes in Quantum Theory. , 1996, Physical review letters.

[12]  Abhishek Parakh,et al.  Correcting rotational errors in three stage QKD , 2016, 2016 23rd International Conference on Telecommunications (ICT).

[13]  Qing-yu Cai,et al.  The "ping-pong" protocol can be attacked without eavesdropping. , 2003, Physical review letters.

[14]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[15]  Subhash C. Kak A Three-Stage Quantum Cryptography Protocol , 2005, ArXiv.

[16]  Pramode K. Verma,et al.  Multi-photon quantum key distribution based on double-lock encryption , 2015, 2015 Conference on Lasers and Electro-Optics (CLEO).

[17]  Pramode K. Verma,et al.  Multi-photon implementation of three-stage quantum cryptography protocol , 2013, The International Conference on Information Networking 2013 (ICOIN).

[18]  R. Feynman Simulating physics with computers , 1999 .

[19]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[20]  Sunghwan Kim,et al.  Minimal-Entanglement Entanglement-Assisted Quantum Error Correction Codes from Modified Circulant Matrices , 2017, Symmetry.

[21]  Mustafa Riza,et al.  A Realizable Quantum Three-Pass Protocol Authentication Based on Hill-Cipher Algorithm , 2015 .

[22]  Anirban Pathak,et al.  Kak’s three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocol , 2018, Quantum Information Processing.

[23]  W. Munro,et al.  Quantum error correction for beginners , 2009, Reports on progress in physics. Physical Society.