Quantum Mechanics Inside Quantum Communication and Quantum Bit Error Rate(QBER)
Keywords:
Quantum mechanics, quantum cryptography, light(photon), eavesdropping, quantum bit error rate(QBER)Abstract
The quantum cryptography has changed the landscape of the conventional cryptography theory and the field of security itself. The Quantum cryptography differs from the classical cryptography in the sense that data and the information are kept secret by the properties of quantum mechanics without importing any extra formulation. In case of classical cryptography the security is based on the conjecture difficulty of factoring and computing a special mathematical function. The first Quantum Key Distribution (QKD) protocol was proposed by C H Bennet and Brassard in 1984[1](BB84). In course of time many variants of QKD protocols have been proposed, all are basically based more or less in the same principle. In this paper role and the beauty of the Quantum Mechanics behind the QKD protocol have been unfolded and explained. The pros-and cons of the protocol have been analyzed in details. The quality of the QKD protocol is measured through a factor called QBER (Quantum Bit Error Rate). The bit error rate is an essential phenomena during the transmission of quantum bit along the quantum channel. Both quantum mechanical and mathematical analysis of QBER have been discussed in the paper. An empirical formula for QBER has been proposed too
References
[1] C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and coin tossing,” Proc. of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175-179, 1984.
[2] [Ekert, A.k. “Quantum cryptography based on Bell‟s Theorem”, Physical Review Letters vol.67.no6 5th august 1991, pp.661-663.
[3] D.Mayers, Journal. of ACM 48, 351 (2001), preliminary version in Mayers, D. Advances in Cryptology-Proc. Crypto 96, vol 1109 of Lecture Notes in Computer Science, Kobiltz, N.Ed.(Springer-Verlag, New York, 1996) pp. 343-357.
[4] E.Biham, M.Boyer, P.O.Boykin, T.Mor and V.Roychowdhury, in Proc of the thirty second annual ACM symposium on theory of computing (Portland, Oregon, United States, 2000), pp. 715-724
[5] H.K.Lo and H.F.Chau Science 283, 2050 (1999)
[6] P.W.Shor and J.Preskill, Phys.Rev. Lett 85,441(2000), arXiv: quantph/0003004.
[7] D.Gottesman, H.K.Lo, N.Liikenhaus and J.Preksill, „Quantum Information and Computation 5, 325 (2004), arXiv: quantph/0212066.
[8] H.Inamori, N.Liikenhaus, and D.Mayers (2001), arXiv.quantph/0107017.
[9] W.Y.Hwang, Phys.Rev. Lett. 91, 057901 (2003).
[10] H.K.Lo, X.Ma and K.Chen, Phys.Rev. Lett 94, 230504 (2005)
[11] H.k.Lo, in Proc of IEEE International Symposium on Information Theory (ISIT) (2004), p.137, arXiv.quant-ph/0509076.
[12] Pradeep Kumar and A. Prabhakar,Bit error rates in a frequency coded quantum key distribution system,Optics Communications 282 (2009)3827-3833.
[13] C.H. Bennett Quantum cryptography using any two non orthogonal states, Physical Review Letters 68 (21) (1992) 3121-3124 [14] Mart Haitjema, “A Survey of the Prominent Quantum Key Distribution Protocols “http://www.cs.wustl.edu/~jain/cse571-07/ftp/quantum/index.html#b92
[15] Scarani, A.Acin, Ribordy, G.Gisin.N.”Quantum Cryptography protocols robust against Photon number Splitting attack.” Physical Review Letters, vol.92.2004 http://www.qci.jst.go.jp/eqsi03/program/papers/O26-Scarani.pdf
[16] N.Gisin. talk presented at the workshop on Quantum Computation, Torino. July 1997; D.bruss. Physical review letter. Vol 81.no3018 (1998)
[17] Bechmann-Pasquinucci, H and Gisin.N “Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography.” Physical Review Letter A59, 4238-4248; (1999).
[18] N.Gisin, G.Ribordy, W.Tittel, H.Zbinden, “Quantum Cryptography”, Review of Modern Physics, Vol 74 No 1, pp145-194, 2002
[19] D.Stucki et al., Appl. Phys. Lett.87, 194108 (2005)
[20] [Gisin N, Ribordy G, Zbinden H, Stucki D, Brunner N and Scarani V 2004, “ Towards practical and fast quantum cryptography”, arXiv:quant-ph/0411022
[21] K.Inoue, E.Waks and Y.Yamanoto.” Differential-phase-shift quantum key distribution using coherent light.” Phys.Rev. A 68.022317 (2003).
[22] E.Waks, H.Takesue and Y. Yamamoto, “Security of differential
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
