PROTOCOL EFFICIENCY USING MULTIPLE LEVEL ENCODING IN QUANTUM SECURE DIRECT COMMUNICATION PROTOCOL
DOI:
https://doi.org/10.15282/ijsecs.9.2.2023.4.0115Keywords:
QSDC, Multiphoton Technique, Encoding Level, Quantum Cryptography, Single stageAbstract
One of the objectives of information security is to maintain the confidentiality and integrity of the information by ensuring that information is transferred in a way that is secure from any listener or attacker. There was no comparison experiment conducted in earlier studies regarding different level encoding performance towards multiphoton technique. Multiphoton technique in the earlier study is particular to transmission time for data transfer encoding and extra time for polarizers to change polarisation angles, both of which contribute to longer transmission times. With four different size of qubits, the three simulation experiments are carried out using Python coding with 2,4 and 8 levels of encoding. Experiment results demonstrate that the most efficient average photon transmission derived from 18 qubit size ranges from 98.71% to 98.73% depending on encoding level. With 18 qubit size, the four-level encoding result has the highest average efficiency, followed by the eight-level and two-level encodings, respectively. 4-level encoding exhibits the highest average photon efficiency between 2 and 8 level encoding.
References
Huanguo Zhang, Zhaoxu Ji, Houzhen Wang, and Wanqing Wu, “Survey on Quantum Information Security,”
China Communications, vol. 16, pp. 1–36, 2019.
Terán Tamayo, Luis Fernando, A. Meier, and J. Pincay, “A reliable security alternative: Quantum cryptography,”
th Int. Conf. eDemocracy eGovernment, ICEDEG 2019, pp. 357–361, 2019.
W. Zhang, D. S. Ding, Y. B. Sheng, L. Zhou, B. Sen Shi, and G. C. Guo, “Quantum Secure Direct Communication
with Quantum Memory,” Phys Rev Lett, vol. 118, no. 22, May 2017, doi: 10.1103/PhysRevLett.118.220501.
B. S. Dhillon and M. J. Nene, “QSDC: Future of Quantum Communication A Study,” in 2021 Fourth
International Conference on Computational Intelligence and Communication Technologies (CCICT), 2021, pp.
–83. doi: 10.1109/CCICT53244.2021.00026.
G. Murali and R. S. Prasad, “Secured cloud authentication using quantum cryptography,” in 2017 International
Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017, pp. 3753–3756.
doi: 10.1109/ICECDS.2017.8390166.
H. R. Pawar and D. G. Harkut, “Classical and Quantum Cryptography for Image Encryption & Decryption,” in
International Conference on Research in Intelligent and Computing in Engineering (RICE), 2018, pp. 1–4.
doi: 10.1109/RICE.2018.8509035.
P. K. Verma, M. El Rifai, and K. W. C. Chan, “Multi-photon Quantum Secure Communication,” 2019. [Online].
Available: http://www.springer.com/series/4748
N. Z. Harun, Z. A. Zukarnain, Z. M. Hanapi, and I. Ahmad, “Evaluation of Parameters Effect in Multiphoton
Quantum Key Distribution over Fiber Optic,” IEEE Access, vol. 6, pp. 47699–47706, Aug. 2018, doi:
1109/ACCESS.2018.2866554.
Z. Sun et al., “Toward Practical Quantum Secure Direct Communication: A Quantum-Memory-Free Protocol and
Code Design,” IEEE Transactions on Communications, vol. 68, no. 9, pp. 5778–5792, 2020, doi:
1109/TCOMM.2020.3006201.
N. Z. Harun, Z. A. Zukarnain, Z. M. Hanapi, and I. Ahmad, “Multi-stage quantum secure direct communication
using secure shared authentication key,” Symmetry (Basel), vol. 12, no. 9, Sep. 2020, doi: 10.3390/sym12091481.
M. A. Sohel, N. Zia, M. A. Ali, and N. Zia, “Quantum Computing based Implementation of Full Adder,” in 2020
IEEE International Conference for Innovation in Technology (INOCON), 2020, pp. 1–4. doi:
1109/INOCON50539.2020.9298394.
N. Z. Harun, Z. A. Zukarnain, Z. M. Hanapi, and I. Ahmad, “Hybrid M-Ary in Braided Single Stage Approach
for Multiphoton Quantum Secure Direct Communication Protocol,” IEEE Access, vol. 7, pp. 22599–22612, 2019,
doi: 10.1109/ACCESS.2019.2898426.
C.-W. Yang and C.-W. Tsai, “Advanced semi-quantum secure direct communication protocol based on bell states
against flip attack,” Quantum Inf Process, vol. 19, no. 4, p. 126, 2020, doi: 10.1007/s11128-020-02623-7.
N. S. B. Azahari, N. Z. B. Harun, and Z. B. A. Zukarnain, “Quantum identity authentication for non-entanglement
multiparty communication: A review, state of art and future directions,” ICT Express, Mar. 2023, doi:
1016/j.icte.2023.02.010.
N. Z. Harun, “Secured Single Stage Multiphoton Approach for Quantum Cryptography Protocol in Free Space,”
El Rifai et al., “Quantum Secure Communication using Polarization Hopping Multistage Protocols,” 2016.
M. El Rifai, N. Punekar, and P. K. Verma, “Implementation of an m-ary three-stage quantum cryptography
protocol,” in Quantum Communications and Quantum Imaging XI, SPIE, Sep. 2013, p. 88750S. doi:
1117/12.2024185.
J. Thomas, “Variations on Kak’s Three Stage Quantum Cryptography Protocol,” Aug. 2007.
B. Darunkar and P. Verma, “The braided single-stage protocol for quantum secure communication,” in Quantum
Information and Computation XII, SPIE, May 2014, p. 912308. doi: 10.1117/12.2050164.
N. S. Azahari and N. Z. Harun, “Quantum Cryptography Experiment using Optical Devices,” 2023. [Online].
Available: www.ijacsa.thesai.org
R. G. Zhou, M. Huo, W. Hu, and Y. Zhao, “Dynamic Multiparty Quantum Secret Sharing with a Trusted Party
Based on Generalized GHZ State,” IEEE Access, vol. 9, pp. 22986–22995, 2021, doi:
1109/ACCESS.2021.3055943.
M. De Oliveira, I. Nape, J. Pinnell, N. Tabebordbar, and A. Forbes, “Experimental high-dimensional quantum
secret sharing with spin-orbit-structured photons,” Phys Rev A (Coll Park), vol. 101, no. 4, Apr. 2020, doi:
1103/PhysRevA.101.042303.
Y. Ding et al., “High-dimensional quantum key distribution based on multicore fiber using silicon photonic
integrated circuits,” npj Quantum Inf, vol. 3, no. 1, 2017, doi: 10.1038/s41534-017-0026-2.
B. Ndagano et al., “A deterministic detector for vector vortex states,” Sci Rep, vol. 7, no. 1, Dec. 2017, doi:
1038/s41598-017-12739-z.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Nur Syuhada Mohamad Rodzi, Nur Shahirah Azahari, Nur Ziadah Harun
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.