Quantum Mechanics Inside Quantum Communication and Quantum Bit Error Rate(QBER)

Authors

  • Nayek S Department of Computer & System Sciences, Visva-Bharati, Santiniketan -731235, INDIA
  • Roy U Department of Computer & System Sciences, Visva-Bharati, Santiniketan -731235, INDIA

Keywords:

Quantum mechanics, quantum cryptography, light(photon), eavesdropping, quantum bit error rate(QBER)

Abstract

The quantum cryptography has changed the landscape of the conventional cryptography theory and the field of security itself. The Quantum cryptography differs from the classical cryptography in the sense that data and the information are kept secret by the properties of quantum mechanics without importing any extra formulation. In case of classical cryptography the security is based on the conjecture difficulty of factoring and computing a special mathematical function. The first Quantum Key Distribution (QKD) protocol was proposed by C H Bennet and Brassard in 1984[1](BB84). In course of time many variants of QKD protocols have been proposed, all are basically based more or less in the same principle. In this paper role and the beauty of the Quantum Mechanics behind the QKD protocol have been unfolded and explained. The pros-and cons of the protocol have been analyzed in details. The quality of the QKD protocol is measured through a factor called QBER (Quantum Bit Error Rate). The bit error rate is an essential phenomena during the transmission of quantum bit along the quantum channel. Both quantum mechanical and mathematical analysis of QBER have been discussed in the paper. An empirical formula for QBER has been proposed too

References

[1] C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and coin tossing,” Proc. of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175-179, 1984.

[2] [Ekert, A.k. “Quantum cryptography based on Bell‟s Theorem”, Physical Review Letters vol.67.no6 5th august 1991, pp.661-663.

[3] D.Mayers, Journal. of ACM 48, 351 (2001), preliminary version in Mayers, D. Advances in Cryptology-Proc. Crypto 96, vol 1109 of Lecture Notes in Computer Science, Kobiltz, N.Ed.(Springer-Verlag, New York, 1996) pp. 343-357.

[4] E.Biham, M.Boyer, P.O.Boykin, T.Mor and V.Roychowdhury, in Proc of the thirty second annual ACM symposium on theory of computing (Portland, Oregon, United States, 2000), pp. 715-724

[5] H.K.Lo and H.F.Chau Science 283, 2050 (1999)

[6] P.W.Shor and J.Preskill, Phys.Rev. Lett 85,441(2000), arXiv: quantph/0003004.

[7] D.Gottesman, H.K.Lo, N.Liikenhaus and J.Preksill, „Quantum Information and Computation 5, 325 (2004), arXiv: quantph/0212066.

[8] H.Inamori, N.Liikenhaus, and D.Mayers (2001), arXiv.quantph/0107017.

[9] W.Y.Hwang, Phys.Rev. Lett. 91, 057901 (2003).

[10] H.K.Lo, X.Ma and K.Chen, Phys.Rev. Lett 94, 230504 (2005)

[11] H.k.Lo, in Proc of IEEE International Symposium on Information Theory (ISIT) (2004), p.137, arXiv.quant-ph/0509076.

[12] Pradeep Kumar and A. Prabhakar,Bit error rates in a frequency coded quantum key distribution system,Optics Communications 282 (2009)3827-3833.

[13] C.H. Bennett Quantum cryptography using any two non orthogonal states, Physical Review Letters 68 (21) (1992) 3121-3124 [14] Mart Haitjema, “A Survey of the Prominent Quantum Key Distribution Protocols “http://www.cs.wustl.edu/~jain/cse571-07/ftp/quantum/index.html#b92

[15] Scarani, A.Acin, Ribordy, G.Gisin.N.”Quantum Cryptography protocols robust against Photon number Splitting attack.” Physical Review Letters, vol.92.2004 http://www.qci.jst.go.jp/eqsi03/program/papers/O26-Scarani.pdf

[16] N.Gisin. talk presented at the workshop on Quantum Computation, Torino. July 1997; D.bruss. Physical review letter. Vol 81.no3018 (1998)

[17] Bechmann-Pasquinucci, H and Gisin.N “Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography.” Physical Review Letter A59, 4238-4248; (1999).

[18] N.Gisin, G.Ribordy, W.Tittel, H.Zbinden, “Quantum Cryptography”, Review of Modern Physics, Vol 74 No 1, pp145-194, 2002

[19] D.Stucki et al., Appl. Phys. Lett.87, 194108 (2005)

[20] [Gisin N, Ribordy G, Zbinden H, Stucki D, Brunner N and Scarani V 2004, “ Towards practical and fast quantum cryptography”, arXiv:quant-ph/0411022

[21] K.Inoue, E.Waks and Y.Yamanoto.” Differential-phase-shift quantum key distribution using coherent light.” Phys.Rev. A 68.022317 (2003).

[22] E.Waks, H.Takesue and Y. Yamamoto, “Security of differential

Downloads

Published

2025-11-24

How to Cite

[1]
S. Nayek and U. Roy, “Quantum Mechanics Inside Quantum Communication and Quantum Bit Error Rate(QBER)”, Int. J. Comp. Sci. Eng., vol. 7, no. 1, pp. 237–244, Nov. 2025.