Abstract
For the generation of a hybrid secret key, hardly any quantum algorithms integrating computed qubits and decrypted bits have yet been developed. Integrating computed qubits and decrypted bits in a predetermined order is difficult for a combiner component. The underlying problems of the study are the design of a quantum circuit, an algorithm, base state polarizer setup, and the concatenation of decrypted bits and computed qubits. By combining either rectilinear, orthogonal (superposition), or both states with decrypted bits, we have investigated three different possibilities for the quantum hybrid protocol. We investigated errors in each case and compared them with regard to decoherence and other quantum mechanics properties by taking into consideration the effectiveness of base states during transmission time across an untrusted channel. Furthermore, we addressed the key size, base state errors, design complexity, and security in a reasonable manner for identifying solutions and compared our results to earlier proposed quantum protocols. Finally, our suggested key protocol is more effective than that of earlier proposed protocols.
Graphical Abstract
Similar content being viewed by others
Data Availability Statement
This manuscript has associated data in a data repository. The data that support the findings of this study are available from the corresponding author upon reasonable request.
Notes
The majority of the literature only uses 45° as an orthogonal state. To improve scalability, we made a few changes.
References
Z. Xin, X. Tang,. in Research and implementation of RSA algorithm for encryption and decryption. Proceedings of 2011 6th international forum on strategic technology. Vol. 2 IEEE, 2011
S. Nicolas, O. Koufopavlou, in On the hardware implementations of the SHA-2 (256, 384, 512) hash functions, Proceedings of the 2003 International Symposium on Circuits and Systems, ISCAS'03.. Vol. 5 IEEE, 2003
J. Thakur, N. Kumar, DES, AES and blowfish: symmetric key cryptography algorithms simulation based performance analysis. Int. J. Emerg. Technol. Adv. Eng. 1(2), 6–12 (2011)
P. Mahajan, A. Sachdeva, A study of encryption algorithms AES, DES and RSA for security. Glob. J. Comput. Sci. Technol. (2013)
J. Lopez, R. Dahab, An overview of elliptic curve cryptography (2000)
D.R. Stinson, Classical cryptography. Cryptograp, Theory Pract. 1–20 (1995)
P.W. Shor, J. Preskill, Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)
H.-K. Lo, X. Ma, K. Chen, Decoy state quantum key distribution. Phys. Rev. Lett. 94(23), 230504 (2005)
V. Makarov, J. Skaar, Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols. https://arxiv.org/abs/quant-ph/0702262 (2007)
H. Bechmann-Pasquinucci, N. Gisin, Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography. Phys. Rev. A 59(6), 4238 (1999)
A. Ling et al., Experimental E91 quantum key distribution. Adv. Opt. Concepts Quantum Comput. Memory Commun. 6903, 69030U (2008)
M. Lopes, N. Sarwade, in On the performance of quantum cryptographic protocols SARG04 and KMB09, 2015 International Conference on Communication, Information & Computing Technology (ICCICT). IEEE, 2015
K. Mattle et al., Dense coding in experimental quantum communication. Phys. Rev. Lett. 76(25), 4656 (1996)
X.S. Liu et al., General scheme for superdense coding between multiparties. Phys. Rev. A 65.2, 022304 (2002)
T. Monz et al., Realization of a scalable Shor algorithm. Science 351.6277, 1068–1070 (2016)
D. Micciancio, O. Regev, Lattice-based cryptography." Post-quantum cryptography. (Springer, Berlin, Heidelberg, 2009), pp. 147-191
J. Ding, A. Petzoldt, Current state of multivariate cryptography. IEEE Secur. Priv. 15(4), 28–36 (2017)
B. Preneel, Analysis and design of cryptographic hash functions (Katholieke Universiteit te Leuven, Diss, 1993)
R. Overbeck, N. Sendrier, Code-based cryptography. Post-quantum cryptography. (Springer, Berlin, Heidelberg, 2009), pp. 95-145
E.R. Verheul, in Evidence that XTR is more secure than supersingular elliptic curve cryptosystems, International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 2001
Y. Wang et al., Topological optimization of hybrid quantum key distribution networks. Opt. Express 28(18), 26348–26358 (2020)
M. Cattaneo, M.G.A. Paris, S. Olivares, Hybrid quantum key distribution using coherent states and photon-number-resolving detectors. Phys. Rev. A 98(1), 012333 (2018)
S. Abruzzo et al., Quantum repeaters and quantum key distribution: analysis of secret-key rates. Phys. Rev. A 87(5), 052315 (2013)
I. Nape et al., Self-healing high-dimensional quantum key distribution using hybrid spin-orbit Bessel states. Opt. Express 26(21), 26946–26960 (2018)
Y. Cao et al., Hybrid trusted/untrusted relay-based quantum key distribution over optical backbone networks. IEEE J. Sel. Areas Commun. 39(9), 2701–2718 (2021)
M. Mehic et al., Quantum key distribution: a networking perspective. ACM Comput. Surv. (CSUR) 53(5), 1–41 (2020)
Y.-Q. He et al., Hybrid linear amplifier-involved detection for continuous variable quantum key distribution with thermal states. Chin. Phys. B 29(5), 050309 (2020)
D.-D. Li et al., High dimensional quantum key distribution with temporal and polarization hybrid encoding. Opt. Fiber Technol. 68, 102828 (2022)
N. Alshaer, M.E. Nasr, T. Ismail, Hybrid MPPM-BB84 quantum key distribution over FSO channel considering atmospheric turbulence and pointing errors. IEEE Photonics J. 13(6), 1–9 (2021)
Q. Zhang et al., Megabits secure key rate quantum key distribution. New J. Phys. 11(4), 045010 (2009)
C.X. Zhang et al., Spin-orbit hybrid entanglement quantum key distribution scheme. Sci. China Phys. Mech. Astron. 57(11), 2043–2048 (2014)
Q.-P. Mao, Le. Wang, S.-M. Zhao, Efficient quantum key distribution based on hybrid degrees of freedom. Laser Phys. 29(8), 085201 (2019)
P. Sibson et al., Chip-based quantum key distribution. Nat. Commun. 8(1), 1–6 (2017)
H. Takesue et al., Differential phase shift quantum key distribution experiment over 105 km fibre. New J. Phys. 7(1), 232 (2005)
Z. Shadman et al., Optimal super dense coding over noisy quantum channels. New J. Phys. 12(7), 073042 (2010)
Z. Shadman et al., A review on super dense coding over covariant noisy channels. Quantum Meas. Quantum Metrol. 1(1), 21–33 (2013)
N. Gisin et al., Quantum cryptography. Rev. Modern Phys. 74(1), 145 (2002)
S. Chow, et al., White-box cryptography and an AES implementation. International Workshop on Selected Areas in Cryptography. (Springer, Berlin, Heidelberg), 2002
N. Jirwan, A. Singh, S. Vijay, Review and analysis of cryptography techniques. Int. J. Sci. Eng. Res. 4(3), 1–6 (2013)
N. Koblitz, A. Menezes, S. Vanstone, The state of elliptic curve cryptography. Des. Codes Crypt. 19(2), 173–193 (2000)
E. Bresson, O. Chevassut, D. Pointcheval, Dynamic group Diffie-Hellman key exchange under standard assumptions. in International conference on the theory and applications of cryptographic techniques, (Springer, Berlin, Heidelberg, 2002)
Funding
The author(s) received no financial support for the research, authorship, and/or publication of this article.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The author declare that they have no conflict of interest.
Ethical approval
This material is the authors' own original work, which has not been previously published elsewhere.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sihare, S.R. Qubit and bit-based quantum hybrid secret key generation. Eur. Phys. J. D 76, 222 (2022). https://doi.org/10.1140/epjd/s10053-022-00532-1
Received:
Accepted:
Published:
DOI: https://doi.org/10.1140/epjd/s10053-022-00532-1