PROTOCOL EFFICIENCY USING MULTIPLE LEVEL ENCODING IN QUANTUM SECURE DIRECT COMMUNICATION PROTOCOL

Authors

  • Nur Syuhada Mohamad Rodzi Department of Information Security and Web Technology, Faculty of Computer Science and Information Technology, University Tun Hussein Onn Malaysia, 86400 Parit Raja, Johor, Malaysia
    • Nur Shahirah Azahari Department of Information Security and Web Technology, Faculty of Computer Science and Information Technology, University Tun Hussein Onn Malaysia, 86400 Parit Raja, Johor, Malaysia
      • Nur Ziadah Harun Department of Information Security and Web Technology, Faculty of Computer Science and Information Technology, University Tun Hussein Onn Malaysia, 86400 Parit Raja, Johor, Malaysia

        DOI:

        https://doi.org/10.15282/ijsecs.9.2.2023.4.0115

        Keywords:

        QSDC, Multiphoton Technique, Encoding Level, Quantum Cryptography, Single stage

        Abstract

        One of the objectives of information security is to maintain the confidentiality and integrity of the information by ensuring that information is transferred in a way that is secure from any listener or attacker. There was no comparison experiment conducted in earlier studies regarding different level encoding performance towards multiphoton technique. Multiphoton technique in the earlier study is particular to transmission time for data transfer encoding and extra time for polarizers to change polarisation angles, both of which contribute to longer transmission times. With four different size of qubits, the three simulation experiments are carried out using Python coding with 2,4 and 8 levels of encoding. Experiment results demonstrate that the most efficient average photon transmission derived from 18 qubit size ranges from 98.71% to 98.73% depending on encoding level. With 18 qubit size, the four-level encoding result has the highest average efficiency, followed by the eight-level and two-level encodings, respectively. 4-level encoding exhibits the highest average photon efficiency between 2 and 8 level encoding.

        Downloads

        Download data is not yet available.

        References

        Huanguo Zhang, Zhaoxu Ji, Houzhen Wang, and Wanqing Wu, “Survey on Quantum Information Security,”

        China Communications, vol. 16, pp. 1–36, 2019.

        Terán Tamayo, Luis Fernando, A. Meier, and J. Pincay, “A reliable security alternative: Quantum cryptography,”

        th Int. Conf. eDemocracy eGovernment, ICEDEG 2019, pp. 357–361, 2019.

        W. Zhang, D. S. Ding, Y. B. Sheng, L. Zhou, B. Sen Shi, and G. C. Guo, “Quantum Secure Direct Communication

        with Quantum Memory,” Phys Rev Lett, vol. 118, no. 22, May 2017, doi: 10.1103/PhysRevLett.118.220501.

        B. S. Dhillon and M. J. Nene, “QSDC: Future of Quantum Communication A Study,” in 2021 Fourth

        International Conference on Computational Intelligence and Communication Technologies (CCICT), 2021, pp.

        –83. doi: 10.1109/CCICT53244.2021.00026.

        G. Murali and R. S. Prasad, “Secured cloud authentication using quantum cryptography,” in 2017 International

        Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017, pp. 3753–3756.

        doi: 10.1109/ICECDS.2017.8390166.

        H. R. Pawar and D. G. Harkut, “Classical and Quantum Cryptography for Image Encryption & Decryption,” in

        International Conference on Research in Intelligent and Computing in Engineering (RICE), 2018, pp. 1–4.

        doi: 10.1109/RICE.2018.8509035.

        P. K. Verma, M. El Rifai, and K. W. C. Chan, “Multi-photon Quantum Secure Communication,” 2019. [Online].

        Available: http://www.springer.com/series/4748

        N. Z. Harun, Z. A. Zukarnain, Z. M. Hanapi, and I. Ahmad, “Evaluation of Parameters Effect in Multiphoton

        Quantum Key Distribution over Fiber Optic,” IEEE Access, vol. 6, pp. 47699–47706, Aug. 2018, doi:

        1109/ACCESS.2018.2866554.

        Z. Sun et al., “Toward Practical Quantum Secure Direct Communication: A Quantum-Memory-Free Protocol and

        Code Design,” IEEE Transactions on Communications, vol. 68, no. 9, pp. 5778–5792, 2020, doi:

        1109/TCOMM.2020.3006201.

        N. Z. Harun, Z. A. Zukarnain, Z. M. Hanapi, and I. Ahmad, “Multi-stage quantum secure direct communication

        using secure shared authentication key,” Symmetry (Basel), vol. 12, no. 9, Sep. 2020, doi: 10.3390/sym12091481.

        M. A. Sohel, N. Zia, M. A. Ali, and N. Zia, “Quantum Computing based Implementation of Full Adder,” in 2020

        IEEE International Conference for Innovation in Technology (INOCON), 2020, pp. 1–4. doi:

        1109/INOCON50539.2020.9298394.

        N. Z. Harun, Z. A. Zukarnain, Z. M. Hanapi, and I. Ahmad, “Hybrid M-Ary in Braided Single Stage Approach

        for Multiphoton Quantum Secure Direct Communication Protocol,” IEEE Access, vol. 7, pp. 22599–22612, 2019,

        doi: 10.1109/ACCESS.2019.2898426.

        C.-W. Yang and C.-W. Tsai, “Advanced semi-quantum secure direct communication protocol based on bell states

        against flip attack,” Quantum Inf Process, vol. 19, no. 4, p. 126, 2020, doi: 10.1007/s11128-020-02623-7.

        N. S. B. Azahari, N. Z. B. Harun, and Z. B. A. Zukarnain, “Quantum identity authentication for non-entanglement

        multiparty communication: A review, state of art and future directions,” ICT Express, Mar. 2023, doi:

        1016/j.icte.2023.02.010.

        N. Z. Harun, “Secured Single Stage Multiphoton Approach for Quantum Cryptography Protocol in Free Space,”

        El Rifai et al., “Quantum Secure Communication using Polarization Hopping Multistage Protocols,” 2016.

        M. El Rifai, N. Punekar, and P. K. Verma, “Implementation of an m-ary three-stage quantum cryptography

        protocol,” in Quantum Communications and Quantum Imaging XI, SPIE, Sep. 2013, p. 88750S. doi:

        1117/12.2024185.

        J. Thomas, “Variations on Kak’s Three Stage Quantum Cryptography Protocol,” Aug. 2007.

        B. Darunkar and P. Verma, “The braided single-stage protocol for quantum secure communication,” in Quantum

        Information and Computation XII, SPIE, May 2014, p. 912308. doi: 10.1117/12.2050164.

        N. S. Azahari and N. Z. Harun, “Quantum Cryptography Experiment using Optical Devices,” 2023. [Online].

        Available: www.ijacsa.thesai.org

        R. G. Zhou, M. Huo, W. Hu, and Y. Zhao, “Dynamic Multiparty Quantum Secret Sharing with a Trusted Party

        Based on Generalized GHZ State,” IEEE Access, vol. 9, pp. 22986–22995, 2021, doi:

        1109/ACCESS.2021.3055943.

        M. De Oliveira, I. Nape, J. Pinnell, N. Tabebordbar, and A. Forbes, “Experimental high-dimensional quantum

        secret sharing with spin-orbit-structured photons,” Phys Rev A (Coll Park), vol. 101, no. 4, Apr. 2020, doi:

        1103/PhysRevA.101.042303.

        Y. Ding et al., “High-dimensional quantum key distribution based on multicore fiber using silicon photonic

        integrated circuits,” npj Quantum Inf, vol. 3, no. 1, 2017, doi: 10.1038/s41534-017-0026-2.

        B. Ndagano et al., “A deterministic detector for vector vortex states,” Sci Rep, vol. 7, no. 1, Dec. 2017, doi:

        1038/s41598-017-12739-z.

        Published

        2023-10-18

        How to Cite

        [1]
        N. S. Mohamad Rodzi, N. S. Azahari, and N. Z. Harun, “PROTOCOL EFFICIENCY USING MULTIPLE LEVEL ENCODING IN QUANTUM SECURE DIRECT COMMUNICATION PROTOCOL”, IJSECS, vol. 9, no. 2, pp. 105–118, Oct. 2023, doi: 10.15282/ijsecs.9.2.2023.4.0115.

        Similar Articles

        1-10 of 45

        You may also start an advanced similarity search for this article.