PROTOCOL EFFICIENCY USING MULTIPLE LEVEL ENCODING IN QUANTUM SECURE DIRECT COMMUNICATION PROTOCOL

Authors

  • Nur Syuhada Mohamad Rodzi Department of Information Security and Web Technology, Faculty of Computer Science and Information Technology, University Tun Hussein Onn Malaysia, 86400 Parit Raja, Johor, Malaysia
  • Nur Shahirah Azahari Department of Information Security and Web Technology, Faculty of Computer Science and Information Technology, University Tun Hussein Onn Malaysia, 86400 Parit Raja, Johor, Malaysia
  • Nur Ziadah Harun Department of Information Security and Web Technology, Faculty of Computer Science and Information Technology, University Tun Hussein Onn Malaysia, 86400 Parit Raja, Johor, Malaysia

DOI:

https://doi.org/10.15282/ijsecs.9.2.2023.4.0115

Keywords:

QSDC, Multiphoton Technique, Encoding Level, Quantum Cryptography, Single stage

Abstract

One of the objectives of information security is to maintain the confidentiality and integrity of the information by ensuring that information is transferred in a way that is secure from any listener or attacker. There was no comparison experiment conducted in earlier studies regarding different level encoding performance towards multiphoton technique. Multiphoton technique in the earlier study is particular to transmission time for data transfer encoding and extra time for polarizers to change polarisation angles, both of which contribute to longer transmission times. With four different size of qubits, the three simulation experiments are carried out using Python coding with 2,4 and 8 levels of encoding. Experiment results demonstrate that the most efficient average photon transmission derived from 18 qubit size ranges from 98.71% to 98.73% depending on encoding level. With 18 qubit size, the four-level encoding result has the highest average efficiency, followed by the eight-level and two-level encodings, respectively. 4-level encoding exhibits the highest average photon efficiency between 2 and 8 level encoding.

References

Huanguo Zhang, Zhaoxu Ji, Houzhen Wang, and Wanqing Wu, “Survey on Quantum Information Security,”

China Communications, vol. 16, pp. 1–36, 2019.

Terán Tamayo, Luis Fernando, A. Meier, and J. Pincay, “A reliable security alternative: Quantum cryptography,”

th Int. Conf. eDemocracy eGovernment, ICEDEG 2019, pp. 357–361, 2019.

W. Zhang, D. S. Ding, Y. B. Sheng, L. Zhou, B. Sen Shi, and G. C. Guo, “Quantum Secure Direct Communication

with Quantum Memory,” Phys Rev Lett, vol. 118, no. 22, May 2017, doi: 10.1103/PhysRevLett.118.220501.

B. S. Dhillon and M. J. Nene, “QSDC: Future of Quantum Communication A Study,” in 2021 Fourth

International Conference on Computational Intelligence and Communication Technologies (CCICT), 2021, pp.

–83. doi: 10.1109/CCICT53244.2021.00026.

G. Murali and R. S. Prasad, “Secured cloud authentication using quantum cryptography,” in 2017 International

Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017, pp. 3753–3756.

doi: 10.1109/ICECDS.2017.8390166.

H. R. Pawar and D. G. Harkut, “Classical and Quantum Cryptography for Image Encryption & Decryption,” in

International Conference on Research in Intelligent and Computing in Engineering (RICE), 2018, pp. 1–4.

doi: 10.1109/RICE.2018.8509035.

P. K. Verma, M. El Rifai, and K. W. C. Chan, “Multi-photon Quantum Secure Communication,” 2019. [Online].

Available: http://www.springer.com/series/4748

N. Z. Harun, Z. A. Zukarnain, Z. M. Hanapi, and I. Ahmad, “Evaluation of Parameters Effect in Multiphoton

Quantum Key Distribution over Fiber Optic,” IEEE Access, vol. 6, pp. 47699–47706, Aug. 2018, doi:

1109/ACCESS.2018.2866554.

Z. Sun et al., “Toward Practical Quantum Secure Direct Communication: A Quantum-Memory-Free Protocol and

Code Design,” IEEE Transactions on Communications, vol. 68, no. 9, pp. 5778–5792, 2020, doi:

1109/TCOMM.2020.3006201.

N. Z. Harun, Z. A. Zukarnain, Z. M. Hanapi, and I. Ahmad, “Multi-stage quantum secure direct communication

using secure shared authentication key,” Symmetry (Basel), vol. 12, no. 9, Sep. 2020, doi: 10.3390/sym12091481.

M. A. Sohel, N. Zia, M. A. Ali, and N. Zia, “Quantum Computing based Implementation of Full Adder,” in 2020

IEEE International Conference for Innovation in Technology (INOCON), 2020, pp. 1–4. doi:

1109/INOCON50539.2020.9298394.

N. Z. Harun, Z. A. Zukarnain, Z. M. Hanapi, and I. Ahmad, “Hybrid M-Ary in Braided Single Stage Approach

for Multiphoton Quantum Secure Direct Communication Protocol,” IEEE Access, vol. 7, pp. 22599–22612, 2019,

doi: 10.1109/ACCESS.2019.2898426.

C.-W. Yang and C.-W. Tsai, “Advanced semi-quantum secure direct communication protocol based on bell states

against flip attack,” Quantum Inf Process, vol. 19, no. 4, p. 126, 2020, doi: 10.1007/s11128-020-02623-7.

N. S. B. Azahari, N. Z. B. Harun, and Z. B. A. Zukarnain, “Quantum identity authentication for non-entanglement

multiparty communication: A review, state of art and future directions,” ICT Express, Mar. 2023, doi:

1016/j.icte.2023.02.010.

N. Z. Harun, “Secured Single Stage Multiphoton Approach for Quantum Cryptography Protocol in Free Space,”

El Rifai et al., “Quantum Secure Communication using Polarization Hopping Multistage Protocols,” 2016.

M. El Rifai, N. Punekar, and P. K. Verma, “Implementation of an m-ary three-stage quantum cryptography

protocol,” in Quantum Communications and Quantum Imaging XI, SPIE, Sep. 2013, p. 88750S. doi:

1117/12.2024185.

J. Thomas, “Variations on Kak’s Three Stage Quantum Cryptography Protocol,” Aug. 2007.

B. Darunkar and P. Verma, “The braided single-stage protocol for quantum secure communication,” in Quantum

Information and Computation XII, SPIE, May 2014, p. 912308. doi: 10.1117/12.2050164.

N. S. Azahari and N. Z. Harun, “Quantum Cryptography Experiment using Optical Devices,” 2023. [Online].

Available: www.ijacsa.thesai.org

R. G. Zhou, M. Huo, W. Hu, and Y. Zhao, “Dynamic Multiparty Quantum Secret Sharing with a Trusted Party

Based on Generalized GHZ State,” IEEE Access, vol. 9, pp. 22986–22995, 2021, doi:

1109/ACCESS.2021.3055943.

M. De Oliveira, I. Nape, J. Pinnell, N. Tabebordbar, and A. Forbes, “Experimental high-dimensional quantum

secret sharing with spin-orbit-structured photons,” Phys Rev A (Coll Park), vol. 101, no. 4, Apr. 2020, doi:

1103/PhysRevA.101.042303.

Y. Ding et al., “High-dimensional quantum key distribution based on multicore fiber using silicon photonic

integrated circuits,” npj Quantum Inf, vol. 3, no. 1, 2017, doi: 10.1038/s41534-017-0026-2.

B. Ndagano et al., “A deterministic detector for vector vortex states,” Sci Rep, vol. 7, no. 1, Dec. 2017, doi:

1038/s41598-017-12739-z.

Published

2023-10-18

How to Cite

Mohamad Rodzi, N. S., Azahari, N. S., & Harun, N. Z. (2023). PROTOCOL EFFICIENCY USING MULTIPLE LEVEL ENCODING IN QUANTUM SECURE DIRECT COMMUNICATION PROTOCOL. International Journal of Software Engineering and Computer Systems, 9(2), 105–118. https://doi.org/10.15282/ijsecs.9.2.2023.4.0115