Dynamic Quantum Key Distribution for Microgrids With Distributed Error Correction
ABSTRACTQuantum key distribution (QKD) has often been hailed as a reliable technology for secure communication in cyber–physical microgrids. Even though unauthorised key measurements are not possible in QKD, attempts to read them can disturb quantum states leading to mutations in the transmitted value. Further, inaccurate quantum keys can lead to erroneous decryption producing garbage values, destabilising microgrid operation. QKD can also be vulnerable to node‐level manipulations incorporating attack values into measurements before they are encrypted at the communication layer. To address these issues, this paper proposes a secure QKD protocol that can identify errors in keys and/or nodal measurements by observing violations in control dynamics. Additionally, the protocol uses a dynamic adjacency matrix‐based formulation strategy enabling the affected nodes to reconstruct a trustworthy signal and replace it with the attacked signal in a multi‐hop manner. This enables microgrids to perform nominal operations in the presence of adversaries who try to eavesdrop on the system causing an increase in the quantum bit error rate (QBER). We provide several case studies to showcase the robustness of the proposed strategy against eavesdroppers and node manipulations. The results demonstrate that it can resist unwanted observation and attack vectors that manipulate signals before encryption.
- Conference Article
2
- 10.1117/12.2290544
- Mar 20, 2018
Quantum Key Distribution (QKD) is attracting much interest for the distribution of cryptographic keys using single photon signals. Currently QKD is often used to provide secure distribution of cryptographic keys for the encryption of data transmitted using conventional classical communication systems. This paper reports major field trials carried out over several months on the Cambridge UK Quantum Network showing the operation of QKD systems alongside high-speed classical transmission systems encrypted QKD derived with AES keys. Quantum Key transmission at record secure key rates of 3.3Mbps, 3.2Mbps and 2.5Mbps has been achieved over 5km, 9.5km and 10.5km long links respectively with corresponding average Quantum bit error rates (QBER) of 2.9%, 2.4% and 3%. Using a 33km link attached to the network with a loss of 7.5 dB, a secure key rate of 1.4 Mbps is achieved with an average QBER of 3.4%. Under loop back conditions this link provides a 66 km transmission path with a 16dB fibre loss, enabling a field trial using the QKD signals multiplexed with two wavelengths each transmitting 100Gb/s classical data to be carried out. This achieves an average secure key rate of 80.2 kbps and a mean QBER of 6.6%, in line with theoretical predictions. During the trial duration, the statistics of the QBER were found to be Gaussian distributed with a standard deviation of 0.5. The results of the field trial suggest that the system works stably and has considerable potential for applications in metropolitan networks. Further measurements will be reported at the conference.
- Research Article
6
- 10.7498/aps.64.110301
- Jan 1, 2015
- Acta Physica Sinica
A measurement-device-independent quantum key distribution (MDI-QKD) protocol is immune to all detection side-channel attacks and guarantees the information-theoretical security even with uncharacterized single photon detectors. A weak coherent source is used in the current MDI-QKD experiments, it inevitably contains a certain percentage of vacuum and multi-photon pulses. The security issues introduced by these source imperfections can be avoided by applying the decoy state method. Here, through modeling experimental devices, and taking into account the weak coherent source and the threshold detectors, we have evaluated the gain, the probability to get successful Bell measurement and incorrect Bell measurement, and the quantum bit error rate (QBER), given a practical setup. In our simulation, we show how QBER varies with different transmission distances in the cases when the average photon numbers per pulse from Alice and Bob are symmetric and asymmetric. Result shows that the multi-photon pulses do not cause error in the Z basis of polarization encoding scheme, but produce a large QBER in phase encoding scheme and in the X basis of polarization encoding scheme. QBER is affected by the dark count rate and the system optical error associated with the multi-photon pulses. For different encoding schemes, QBER caused by each kind of average photon numbers from Alice and Bob increases to different degrees with the transmission distance, and finally is close to 50%. With the increase of the transmission distance, the average photon number per pulse decreases and the fraction of the dark count rate causing QBER gradually increases. Under the same effect of the dark count rate, the smaller the average photon number per pulse, the bigger the QBER. After a certain transmission and at the same transmission distance, the QBER is largest when average photon numbers used by Alice and Bob are both smallest. For the short distance transmission of phase encoding scheme and the X basis, we find that QBER is larger when average photon numbers from the two arms are asymmetric, as compared to the symmetric case. For the Z basis, the QBER caused by the system optical error and the dark count rate is very small.
- Research Article
- 10.1002/dac.70009
- Feb 17, 2025
- International Journal of Communication Systems
ABSTRACTAn Optimized Efficient Predefined Time Adaptive Neural Network for Identifying Parameters in Quantum Bit Error Rate (EPTANN‐IP‐QBER) is proposed in this manuscript. Here, the input signals are gathered from 6G wireless networks that face obstacles channel. To execute this, the High‐Level Target Navigation Pigeon‐Inspired Optimization (HLTNPIO) is used to extend the maximum transmission distances and improve the secret key rates of input signals. Then, improved secret key rates input signals are fed to EPTANN for effectively identifying the parameters such as laser linewidth, channel dispersion, decoy states, error correction rate, privacy amplification efficiency, eavesdropping detection, scalability, and photon encoding optimization in quantum bit error rates (QBERs). Generally, EPTANN does not adapt any optimization approaches to determine optimal parameters to identify the parameters in QBER. Hence, the Snow Avalanches Algorithm (SAA) is employed to optimize the EPTANN, which accurately identifies the parameter in QBER reduction. The proposed EPTANN‐IP‐QBER is implemented in Python. The performance metrics, like accuracy, precision, secure key rate, QBER, transmission distance, and computational time, are analyzed. The performance of the EPTANN‐IP‐QBER approach attains 20.25%, 18.36%, and 23.28% lower QBER; 29.56%, 19.42%, and 27.74% higher accuracy; and 16.21%, 20.26%, and 26.96% higher precision when analyzed to the existing methods: Millimeter‐Waves to Terahertz SISO along MIMO Continuous‐Variable Quantum Key Distribution (TSISO‐MIMO‐VQKD), MIMO Terahertz QKD utilizing Restricted Eavesdropping (MIMO‐QKD‐URE), and single‐emitter quantum key distribution more than 175 km of fiber by optimized finite key rates (SEQKD‐FKR) methods, respectively.
- Research Article
6
- 10.7498/aps.65.100302
- Jan 1, 2016
- Acta Physica Sinica
Measurement-device-independent quantum key distribution (MDI-QKD) is immune to all detection side-channel attacks, thus when combined with the decoy-state method, it can avoid the actual security loophole caused by quasisingle- photon source simultaneously. A practical weak coherent source is used as a quasi-single-photon source in the current MDI-QKD experiments; it may contain percentage of vacuum-and multi-photon pulses. Moreover, in order to study how the performance of the threshold detector affects the quantum bit error rate (QBER), we introduce the quality factor (the ratio of the dark count rate to the detection efficiency) of the threshold detector. Here, through taking into account the weak coherent source, the quality factor of the threshold detector and the reflectivity of beam splitter, we deduce and evaluate the gain, the probability for successful Bell measurement, incorrect Bell measurement when Alice and Bob send pulses with different photon numbers which have a high probability to appear in weak coherent source, and then we obtain QBER in combination with the probabilities of different photon number states, besides, we also do some simulations. The simulations show how QBER varies with the reflectivity of beam splitter and the quality factor of the threshold detector when the average photon numbers per pulse from Alice and Bob are symmetric. Furthermore, the simulations show how QBER varies with the average photon number per pulse from Alice when average photon number per pulse from Bob is 0.1. Result shows that QBER is affected by the reflectivity of beam splitter, but QBER cannot reach the minimum value in Z basis encoding scheme when the average photon numbers per pulse from Alice and Bob are both 0.1 and the reflectivity of beam splitter is 0.5, which is different from X basis encoding and phase encoding. In addition, QBER increases with the increase of the quality factor of the threshold detector, which means that better performance of the threshold detector will reduce QBER. We show that QBER in Z basis encoding reaches the minimum value when reflectivity of beam splitter is 0.5 and there is large difference between in average photon number per pulse between two sides. In conclusion, for QBER, the effect from the reflectivity of beam splitter is equal to average photon numbers from the two arms only in X basis encoding and phase encoding. Our work will provide a reference for setting up a system with better performance.
- Research Article
11
- 10.3390/e16063121
- Jun 5, 2014
- Entropy
Physical implementations of quantum key distribution (QKD) protocols, like the Bennett-Brassard (BB84), are forced to use attenuated coherent quantum states, because the sources of single photon states are not functional yet for QKD applications. However, when using attenuated coherent states, the relatively high rate of multi-photonic pulses introduces vulnerabilities that can be exploited by the photon number splitting (PNS) attack to brake the quantum key. Some QKD protocols have been developed to be resistant to the PNS attack, like the decoy method, but those define a single photonic gain in the quantum channel. To overcome this limitation, we have developed a new QKD protocol, called ack-QKD, which is resistant to the PNS attack. Even more, it uses attenuated quantum states, but defines two interleaved photonic quantum flows to detect the eavesdropper activity by means of the quantum photonic error gain (QPEG) or the quantum bit error rate (QBER). The physical implementation of the ack-QKD is similar to the well-known BB84 protocol.
- Research Article
- 10.54021/seesv5n2-010
- Jul 3, 2024
- STUDIES IN ENGINEERING AND EXACT SCIENCES
The burgeoning Internet and Internet-of-Things (IoT) sectors necessitate robust cryptographic methods to ensure data security, integrity, and authentication over unsecured networks. Traditional public key cryptography, reliant on computationally hard problems, faces threats from quantum computing advancements. Quantum Key Distribution (QKD) presents a solution through the generation of unconditionally secure cryptographic keys using quantum mechanics. This paper explores the enhancement of QKD protocols to establish secure end-to-end communication in photonic networks. The proposed method involves a QKD system that generates two types of weak quantum signals: one with randomly varied intensity, polarization, or phase, and another with random frequency fluctuations. These signals are used to establish a shared key between a transmitter (Alice) and multiple receivers (Bobs) by measuring the quantum states. This dual signal approach enhances protection against Photon Number Splitting attacks and improves key length. Key Management Agents (KMAs) securely handle QKD-generated keys for data encryption before transmission, ensuring only intended recipients can decrypt the messages. The system leverages optical fiber or free-space optical links to transmit weak quantum signals and synchronization signals, facilitating key distribution even under existing network constraints. The proposed architecture allows for the secure exchange of cryptographic keys between Alice and multiple Bobs, ensuring private and authenticated communication over public channels. The approach mitigates potential eavesdropping by enabling the detection of any interception attempts through Quantum Bit Error Rate (QBER) estimation. This study underscores the promise of QKD as a foundational element of future communication systems, providing uncrackable quantum keys and paving the way for secure photonic networks. Incremental advancements in quantum devices, networking, and infrastructure are essential to fully realize QKD's potential for robust cryptographic security.
- Research Article
- 10.7498/aps.60.094216.1
- Jan 1, 2011
- Acta Physica Sinica
The value of the half-wave voltage of the phase modulator must be measured with high accuracy to reduce the quantum bit error rate (QBER) in a quantum key distribution system based the phase-coding scheme. A new method to measure the half-wave voltage of the phase modulator in an accuracy of 2 mV by adjusting the quantum bit error rate (QBER) of the deterministic quantum key distribution is proposed experimentally to increase the accuracy of the half-wave voltage and reduce the error rate of the quantum key distribution system. The experimental results show that this method can be used to acquire efficiently the half-wave voltage of the phase modulator in a high accuracy which can make the error rate from adding the inaccurate voltage to the phase modulator decrease to the greatest extent.
- Research Article
23
- 10.1103/physreva.72.062325
- Dec 19, 2005
- Physical Review A
We have implemented an experimental setup in order to demonstrate the feasibility of time-coding protocols for quantum key distribution. Alice produces coherent 20-ns faint pulses of light at 853 nm. They are sent to Bob with delay 0 ns (encoding bit 0) or 10 ns (encoding bit 1). Bob directs at random the received pulses to two different arms. In the first one, a 300 ps resolution Si photon counter allows Bob to precisely measure the detection times of each photon in order to establish the key. Comparing them with the emission times of the pulses sent by Alice allows one to evaluate the quantum bit error rate (QBER). The minimum obtained QBER is 1.62%. The possible loss of coherence in the setup can be exploited by Eve to eavesdrop the line. Therefore, the second arm of Bob setup is a Mach-Zehnder interferometer with a 10 ns propagation delay between the two paths. Contrast measurement of the output beams allows one to measure the autocorrelation function of the received pulses that characterizes their average coherence. In the case of an ideal setup, the value expected with the pulses sent by Alice is 0.576. The experimental value of the pulses autocorrelation function is found to be 0.541. Knowing the resulting loss of coherence and the measured QBER, one can evaluate the mutual information between Alice and Eve and the mutual information between Alice and Bob, in the case of intercept-resend attacks and in the case of attacks with intrication. With our values, Bob has an advantage on Eve of 0.43 bit per pulse. The maximum possible QBER corresponding to equal informations for Bob and Eve is 5.8%. With the usual attenuation of fibres at 850 nm, it shows that secure key distribution is possible up to a distance of 2.75 km, which is sufficient for local links.
- Research Article
- 10.1002/cpe.70221
- Jul 31, 2025
- Concurrency and Computation: Practice and Experience
ABSTRACTThe rapid evolution of quantum computing poses a significant threat to classical cryptographic systems like Rivest‐Shamir‐Adleman (RSA) and Elliptic Curve Cryptography (ECC), which rely on the computational hardness of problems such as integer factorization and discrete logarithms. Quantum algorithms such as Shor's algorithm can solve these problems quickly, which undermines the foundations on which classical cryptography relies. Quantum Key Distribution (QKD) is an alternative to the classical methods, which promises information‐theoretic security based on quantum mechanics. Currently, there are existing QKD protocols, including BB84, B92, E91, and GHZ, all of which exhibit various real‐world limitations. For example, these QKD protocols can be vulnerable to a variety of side‐channel attacks (e.g., detector blinding, photon‐number‐splitting) and neglect to consider fluctuating network conditions. Current QKD protocols also fail to accommodate scalability for many‐to‐many or noise‐limited scenarios. Many implementations of the existing QKD protocols and other common forms of networks remain static, relying on arbitrary decisions of fixed values that yield simple linear conclusions that can be predicted and targeted in the real‐world environment. To address these omissions, we propose a new framework for dynamic or adaptive hybrid QKD in which we incorporate BB84, B92, E91, and GHZ into one common approach with all protocols selected based on a probability‐weighted distribution of (0.3, 0.2, 0.3, 0.2). In the hybrid QKD implementation, the probability weights of protocol selection are assigned with partiality toward BB84, E91, B92, and GHZ, respectively. This may also introduce a higher variety of protocols and diversity in approaches that will further limit cross‐protocol possibilities of attack vectors, while increasing the possible flexibility of adaptability in attacked situations. In addition, we incorporate an artificial intelligence (AI)‐based optimization module using a neural network to evaluate local environmental noise and quantum bit error rate (QBER) in real time. It adjusts protocol selection probabilities dynamically based on both historical and live operational data to optimize throughput while maintaining low error rates. The system architecture supports modular and parallel operation and has been mapped out and designed to be scalable and compatible with future quantum networks. We test our system using IBM's Qiskit AerSimulator utilizing a 14‐qubit register with 100 rounds of a 1% depolarization noise model, which significantly outperformed static hybrids such as Chen et al. in terms of both key rate and QBER. Our system consistently produced an average QBER of 0.02 and a key generation rate of 12 bits per round. E91 consistently produced CHSH violating confirming the fidelity of the entanglement, while BB84 displayed no QBER on all rounds. This work demonstrates the first fully integrated, AI‐assisted, dynamic hybrid QKD system. It includes all advantageous features of a QKD protocol: the dynamic adaptability of the protocol allows for a performance driven environment, the use of entangled states provides increased security, and a bottom‐up approach to real‐time optimization creating a robust, scalable, and agnostic system to any hardware used by post‐quantum cryptographic infrastructures.
- Research Article
5
- 10.33633/jcta.v1i2.9547
- Dec 20, 2023
- Journal of Computing Theories and Applications
This research proposes a combination of Quantum Key Distribution (QKD) based on the BB84 protocol with Improved Logistic Map (ILM) to improve data transmission security. This method integrates quantum key formation from BB84 with ILM encryption. This combination creates an additional layer of security, where by default, the operation on BB84 is only XOR-substitution, with the addition of ILM creating a permutation operation on quantum keys. Experiments are measured with several quantum measurements such as Quantum Bit Error Rate (QBER), Polarization Error Rate (PER), Quantum Fidelity (QF), Eavesdropping Detection (ED), and Entanglement-based detection (EDB), as well as classical cryptographic analysis such as Bit Error Ratio (BER), Entropy, Histogram Analysis, and Normalized Pixel Change Rate (NPCR) and Unified Average Changing Intensity (UACI). As a result, the proposed method obtained satisfactory results, especially perfect QF and BER, and EBD, which reached 0.999.
- Conference Article
2
- 10.1109/isabel.2010.5702884
- Nov 1, 2010
Objective of this paper is the study of Quantum Key Distribution (QKD) protocols based on classical error-correcting codes. The Quantum Key Distribution (QKD) systems and related protocols, in particular conditions, can use the classic channel coding techniques, instead of quantum error-correcting codes, both for correcting errors that occurred during the exchange of a cryptographic key between two authorized users, and to allow privacy amplification, in order to make completely vain a possible intruder attempt. The secret key is transmitted over a quantum, and thus safe, channel, characterized by very low transmission rates and high error rates. This channel is safe for the properties of a quantum system, where each measurement on the system perturbs the system itself, allowing the authorized users to “feel” if there is any intruder listening. Moreover, as shown by accurate experimental studies, the communication channel used for quantum key exchange is not able to reach high levels of reliability (the Quantum Bit Error Rate (QBER) takes values between 0.05 and 0.11), both because of the inherent characteristics of the system, and of the presence of a possible attacker. Thus, in order to obtain acceptable residual error rates, it is necessary to use a parallel classical and public channel, conversely characterized by high transmission rates and low error rates, on which to transmit only the redundancy bits of systematic channel codes with performance possibly close to the capacity limit.
- Research Article
9
- 10.1364/oe.477156
- Feb 7, 2023
- Optics Express
The full time-jitter response of a single-photon detector can make a significant contribution to the quantum bit error rate (QBER) of high repetition rate quantum key distribution (QKD) implementations. Although there have been studies into understanding the contribution for single-mode optical fiber coupled single-photon detectors, the contribution of larger, multimode core diameters to the QBER have not been explored in detail. With the growing importance of free-space QKD, which typically use multimode fibers to reduce coupling loss, it is vitally important to understand how the multimode fiber coupling will impact the total QBER. This work studies the impact of the time-jitter contribution to QBER when coupling a commercial off-the-shelf silicon single-photon avalanche diode with various multimode fibers while simulating operating at 1 GHz with empirical measurements taken at 1 MHz repetition rate. It was found that step-index multimode fibers can significantly increase the QBER, while graded-index fibers can provide an QBER contribution similar to a single-mode fiber. The results highlight that there is a significant benefit in using graded index multimode fibers for a free-space QKD receiver, particularly for high repetition rate applications.
- Conference Article
2
- 10.1109/ithings-greencom-cpscom-smartdata-cybermatics55523.2022.00106
- Aug 1, 2022
This paper presents theoretical analysis of Quantum Bit Error Rate (QBER) for Quantum Key Distribution (QKD) in mobile networks (5G/6G). The considered configuration of the underlying optical fiber network that is available for the establishment of the QKD in multi-site 5G networks assumes that the 5G sites are connected by a single optical fiber. Thus, multiplexing of both quantum and classical channels in a single optical fiber is thus necessary. This, in turn, results in a cross talk between classical and quantum channels, which increases QBER and imposes limitations on the maximum distance that can be reached. The approach followed in this paper provides an estimate of the maximum quantum link budget for the targeted QBER. The results of the analysis show that the QKD solution considered here can be potentially deployed using current Operators’ 5G infrastructures to replace currently used asymmetric key exchange algorithms if needed.
- Book Chapter
2
- 10.1007/978-981-10-6454-8_21
- Sep 5, 2017
With the increasing information being shared online, the vast potential for cybercrime is a serious issue for individuals and businesses. Quantum key distribution (QKD) provides a way for distribution of secure key between two communicating parties. However, the current Quantum Key Distribution method, BB84 protocol, is prone to several weaknesses. These are Photon-Number-Splitting (PNS) attack, high Quantum Bit Error Rate (QBER), and low raw key efficiency. Thus, the objectives of this paper are to investigate the impacts of BB84 protocol towards QBER and raw key efficiencies in single quantum channel. Experiments were set up using a QKD simulator that was developed in Java NetBeans. The simulation study has reaffirmed the results of QBER and raw key efficiencies for the single quantum channel BB84 protocol.
- Research Article
- 10.7498/aps.70.20210749
- Jan 1, 2021
- Acta Physica Sinica
A free-space quantum key distribution (QKD) system based on mobile equipment can provide an effective method to construct a real-time full-coverage multi-node network. However, the existing free-space QKD systems based on mobile devices encounter the challenge regarding the lack of stability caused by equipment disturbance. The robustness of the QKD polarization encoder against mobile device disturbance will be significant. Owing to the inevitable disturbance in practical applications, even the polarization-maintaining fiber (PMF) cannot maintain its polarization-maintaining characteristics well, which in turn affects the stability of some systems based on PMF. Therefore, in order to ensure that stable coding can be achieved under disturbances, we propose a two-way differential modulation mode, in which stable coding can still be achieved even under disturbances. At the same time, in order to verify the actual anti-disturbance characteristics of the mode, the polarization-modulated unit (PMU) with a two-way differential modulation mode is used in this study to generate four long-term stable polarization states subjected to the disturbances with a frequency of 200 Hz. At the same time, the PMU has a higher insertion loss, which makes the influence of crosstalk on the system more obvious. We also discuss two ways i.e. the time domain and frequency domain, to reduce the crosstalk which is caused by the imperfection of the device. The experiment is performed at a repetition frequency of 250 MHz, and a commercial avalanche single-photon detector is used to detect the system’s quantum bit error rate (QBER). Under the condition of no disturbance, the average QBER is 0.39% in 2 h. Then a vibration of approximately 200 Hz is used to simulate the practical disturbances, the average QBER is 0.36% in 2 h, and the fluctuation range of the QBER is only within 0.2%. We propose the first feasible encoding scheme in disturbed environments to ensure the long-term stability of the encoded polarization states, which is expected to be used in the multi-node expansion of the quantum network.
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.