Initiated decoy states in quantum key distribution protocol by 3 ways channel

After decades of research, computer scientists have in recent years come close to reaching substantive results which prove the usability of quantum key distribution (QKD). Several QKD protocols and different schemes have surfaced since the last century. Additionally, some of these protocols were created in new algorithms and up until now, have been proven to be secure; however, other scientists only made modifications to previous original protocols. This paper seeks to create a new scheme in QKD that will communicate between two parties and will give them a high level of security against any well-known attacks while handling both of parties in a manner that will reduce their dependency on both classic communication and the classical channel.

[1]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[2]  B. Achiriloaie,et al.  VI REFERENCES , 1961 .

[3]  L. Oesterling,et al.  Comparison of commercial and next generation quantum key distribution: Technologies for secure communication of information , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[4]  Fr'ed'eric Grosshans,et al.  Photon-Number-Splitting-attack resistant Quantum Key Distribution Protocols without sifting , 2013, 1306.6061.

[5]  Wenjie Liu,et al.  Mutually authenticated quantum direct communication based on entanglement swapping , 2010, 2010 Sixth International Conference on Natural Computation.

[6]  Tzonelih Hwang,et al.  EPR quantum key distribution protocols with potential 100% qubit efficiency , 2007, IET Inf. Secur..

[7]  Classical Cryptography v / s Quantum Cryptography A Comparative Study , 2012 .

[8]  Hong-Wei Li,et al.  Security of practical quantum key distribution system , 2011, 2011 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS).

[9]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[10]  Shumei Wang,et al.  High performance quantum cryptography architectures in IEEE 802.11 WLAN , 2010, 2010 2nd International Conference on Advanced Computer Control.

[11]  Wang Xianhui,et al.  A quasi quantum secure direct communication protocol with authentication , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[12]  Fei Gao,et al.  Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols , 2010, IEEE Journal of Quantum Electronics.

[13]  S. Saharudin,et al.  A single photon quantum user Bi-directional authentication scheme over noiseless channel , 2012, 2012 IEEE Symposium on Industrial Electronics and Applications.

[14]  Robin Blume-Kohout,et al.  Streaming Universal Distortion-Free Entanglement Concentration , 2009, IEEE Transactions on Information Theory.

[15]  Xiaoyu Li,et al.  Quantum information authentication using entangled states , 2006, International Conference on Digital Telecommunications (ICDT'06).

[16]  Hideki Imai,et al.  On the security of the quantum key distribution using the Mean King Problem , 2010, 2010 International Symposium On Information Theory & Its Applications.

[17]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[18]  Zhang Xiao,et al.  An Improved Method of Quantum Key Distribution Protocol , 2009, 2009 International Forum on Computer Science-Technology and Applications.

[19]  Hoi-Kwong Lo,et al.  From Quantum Cheating to Quantum Security , 2000, quant-ph/0111100.

[20]  S. Wang,et al.  A modified protocol of quantum state sharing based on entanglement swapping and random EPR selection , 2008, 2008 International Conference on Neural Networks and Signal Processing.

[21]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[22]  Liju Chen,et al.  Quantum Authentication Protocol Using Bell State , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[23]  Albert Einstein,et al.  Can Quantum-Mechanical Description of Physical Reality Be Considered Complete? , 1935 .