Abstract

Quantum cryptography enables unconditional security, which would be one of most promising techniques for the internet of things networks deployment. While backwards existing in the realistic systems may be explored by the eavesdroppers, thus threatening the information security. We present a coherent state based quantum cryptography protocol, which has capability of high robust. Concretely, real local oscillator and discrete modulation strategies are adopted for such purpose. The former circumvents the side-channel attack effectively, and the latter providers long transmission distance. Numerical simulations are performed, during which the optimized modulation variance is taken into account to achieve long transmission distance and high secrete key rate. The results reveal that phase mismatch and weak reference pulse resulting from the real local oscillator will degrade the performance, as well as voltage fluctuation from the modulator. Also, discrete modulation with more states may outperform over those less states in secret key rate for short transmission range.

Highlights

  • It is well known that the internet of things (IoT) interconnects numerous devices/sensors, which requires strikingly large bandwidth as well as information capacity in the communication networks [1]–[3]

  • The coherent state based quantum cryptography (QC) system with real local oscillator (LO) strategy and discrete modulation format which could be deployed in the networks is descripted as follows

  • According to the preceding derivation associated with secret key rate, it is a nonlinear function of the modulation variable VA

Read more

Summary

Introduction

It is well known that the internet of things (IoT) interconnects numerous devices/sensors, which requires strikingly large bandwidth as well as information capacity in the communication networks [1]–[3]. We theoretically analyze the security of coherent state based QC with discrete modulation format and real LO scheme by taking the impact of mature classical devices into account for the first time in this paper.

Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.