Hybrid M-Ary in Braided Single Stage Approach for Multiphoton Quantum Secure Direct Communication Protocol

Quantum secure direct communication (QSDC) is a branch of quantum cryptography which exploits laws of physics and was recently proposed for securing information transferred from sender to receiver without relying on computational complexity. Instead of an entangled photon, the quantum cryptography employs two other approaches, single photon and multiphoton for encoding the messages. The multiphoton was proposed to outperform the weaknesses of a single photon by introducing the multiplicity of a photon to perform data encryption tasks. Despite the advantages of multiphoton, the transmission time to transfer the encoded data is still regarded as a critical issue. Most of the multiphoton approaches require multiple photons to travel along a number of stages. Moreover, extra time is needed to change the polarization angle of the optical device for encoding purposes. These situations have resulted in an increase in source redundancy, which subsequently leads to an increase in the transmission time. In this paper, a compression message approach is proposed to mitigate the substantial increase in time used for the data transmission processes. The proposed compression approach, namely, hybrid M-ary in a braided single stage (HMBSS) is based on the lossless data encoding such that the number of photons is reduced in the data transmission stage. Extensive simulation experiments have been conducted to test the performance of the proposed approach against some selected multiphoton approaches. The results show that the proposed approach outperforms braided single-stage, M-ary three-stage and initialization vector in terms of reducing total average transmission time to encode the photon by about 75.9% and 91.7%, respectively. Furthermore, the HMBSS reduces the overhead on the transmission channel by minimizing the number of message’s bits by about 45% in average even when the length of the message increases during the transmission as compared to others.

[1]  Pramode K. Verma,et al.  Multi-photon Quantum Secure Communication , 2018, Signals and Communication Technology.

[2]  Chuan Wang,et al.  Recent development in quantum communication , 2012 .

[3]  P. Dhavachelvan,et al.  A survey on data compression techniques: From the perspective of data quality, coding schemes, data type and applications , 2021, J. King Saud Univ. Comput. Inf. Sci..

[4]  Simon Foster,et al.  Optics , 1981, Arch. Formal Proofs.

[5]  Marcelo Eduardo Pellenz,et al.  Lightweight Data Compression in Wireless Sensor Networks Using Huffman Coding , 2014, Int. J. Distributed Sens. Networks.

[6]  Ashraf Y. A. Maghari,et al.  Lossless Image Compression Techniques Comparative Study , 2016 .

[7]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[8]  Nidhi Dhawale Implementation of Huffman algorithm and study for optimization , 2014, 2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014).

[9]  Pramode K. Verma,et al.  Multi-stage quantum secure communication using polarization hopping , 2015, Secur. Commun. Networks.

[10]  Subhash C. Kak A Three-Stage Quantum Cryptography Protocol , 2005, ArXiv.

[11]  Nigam Sangwan Combining Huffman text compression with new double encryption algorithm , 2013, 2013 International Conference on Emerging Trends in Communication, Control, Signal Processing and Computing Applications (C2SPCA).

[12]  Pramode K. Verma,et al.  Implementation of Secure Quantum Protocol using Multiple Photons for Communication , 2012, ArXiv.

[13]  Bin Gu,et al.  Robust Quantum Secure Communication with Spatial Quantum States of Single Photons , 2013 .

[14]  Masahito Hayashi,et al.  Finite-block-length analysis in classical and quantum information theory , 2016, Proceedings of the Japan Academy. Series B, Physical and biological sciences.

[15]  Michael R. Grimaila,et al.  Using Modeling and Simulation to Study Photon Number Splitting Attacks , 2016, IEEE Access.

[16]  Mark M. Wilde,et al.  Quantum Rate Distortion, Reverse Shannon Theorems, and Source-Channel Separation , 2011, IEEE Transactions on Information Theory.

[17]  Bhagyashri Darunkar,et al.  MULTI-PHOTON TOLERANT QUANTUM KEY DISTRIBUTION PROTOCOLS FOR SECURED GLOBAL COMMUNICATION , 2017 .

[18]  Pramode K. Verma,et al.  Polarization based secure AES key transmission over optical fiber , 2016, 2016 IEEE International Conference on Communications (ICC).

[19]  Pramode K. Verma,et al.  The braided single-stage protocol for quantum secure communication , 2014, Sensing Technologies + Applications.

[20]  Wei Zhang,et al.  Quantum Secure Direct Communication with Quantum Memory. , 2016, Physical review letters.

[21]  Yamamoto Hiroshi,et al.  An implementation of steganography using construction of Huffman tree , 2012, 2012 International Symposium on Information Theory and its Applications.

[22]  G. Georgiev,et al.  Computerized Stokes analysis of optically active polymer films , 2010, 1009.1332.