Abstract

This paper proposes a new quantum key distribution(QKD) protocol, namely the pseudo-random bases entangled photon based QKD (PRB-EPQKD) protocol. The latest mainly focuses on three properties, including the security of the protocol, the secure key size and the maximum communication distance between legitimate communication users (Alice and Bob). To achieve this, we first consider a spontaneous-parametric-down (SPDC) photon source located in a low-earth-orbit (LEO) type satellite capable of producing and distributing entangled photons pairs to Alice and Bob. Secondly, we assume that Alice’s and Bob’s photons state measurement bases are identically generated via a pseudo-random number generator (PRNG), namely the quantum logistic map (QLM). Finally, we also assume that in addition to their photons states, Alice and Bob intentionally share a set of decoy states at each pulse with randomly selected intensity, and with the goal to detect the presence of the eavesdropper (Eve). Under these considerations, the secure key rate upper bound is evaluated applying the Gottesman-Lo-Lutkenhaus-Preskill’s (GLLP) formula, for two different implementations, namely the non-decoy states and the infinite active decoy states based QKD. It is observed a significant improvement in the secure key size and the communication distance as well, compared to existing protocols, since we realize that under daylight, downlinks satellite conditions, a kindly selected light source, and good crystal’s properties, the maximum communication distance can reach up to 70000 km. In addition, using the combined type-I and type-II SPDC photons source as our entangled photons pairs generator, significantly improved the photon mean number and render our protocol more robust against photon number division attack and against attenuation-induced atmospheric propagation. Furthermore, the protocol is more secure as compared to existing ones, given that any eavesdropper must crack simultaneously the chaotic system used as PRNG and the QKD system, before getting any useful information as regards to the measurement bases used by Alice and Bob, and thus the secure key.

Highlights

  • The last few decades have known true evolution in quantum information processing theory, and several methods have been developed to protect sensitive information

  • This paper proposes a new quantum key distribution(QKD) protocol, namely the pseudo-random bases entangled photon based QKD (PRB-EPQKD) protocol

  • We assume that in addition to their photons states, Alice and Bob intentionally share a set of decoy states at each pulse with randomly selected intensity, and with the goal to detect the presence of the eavesdropper (Eve)

Read more

Summary

Introduction

The last few decades have known true evolution in quantum information processing theory, and several methods have been developed to protect sensitive information. This protocol provides unconditional security, it does not allow long-distance communication This is the reason why, we propose in this research paper to locate both the SPDC entangled photon source and the decoy states source into a satellite, which has the role to producing and distributing entangled photon pairs and decoy states to Alice and Bob to enhance the communication distance and used pseudo-random bases for photon polarization states measurement to enhance the key size. Assume our random bases choice to be guaranteed by the quantum logistic map (QLM) [46], the SPDC-photon source to be our entangled photons generator and a decoy states source located in a LEO-type satellite to ensure downlink communication with lower loss This is realized following the structure below: Sec. presents in detail the model formalism, where the SPDC entangled photon Hamiltonian is presented and the wave function including the probability distribution are deduced.

SPDC entangled photons source Hamiltonian
Wave function and probability density
Decoy states based satellite-to-earth link QKD protocol
Free-space key rate estimation results and discussion
Key rate estimation in case of non-decoy states with threshold detector
Findings
Concluding remarks
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call