CFP last date
20 January 2025
Reseach Article

Random Photon Key Pasting (RPKP) for Secure Optical Data Transport in Quantum Key Distribution

by T.M Bhraguram, S.Shermin
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 18 - Number 2
Year of Publication: 2011
Authors: T.M Bhraguram, S.Shermin
10.5120/2320-2782

T.M Bhraguram, S.Shermin . Random Photon Key Pasting (RPKP) for Secure Optical Data Transport in Quantum Key Distribution. International Journal of Computer Applications. 18, 2 ( March 2011), 46-51. DOI=10.5120/2320-2782

@article{ 10.5120/2320-2782,
author = { T.M Bhraguram, S.Shermin },
title = { Random Photon Key Pasting (RPKP) for Secure Optical Data Transport in Quantum Key Distribution },
journal = { International Journal of Computer Applications },
issue_date = { March 2011 },
volume = { 18 },
number = { 2 },
month = { March },
year = { 2011 },
issn = { 0975-8887 },
pages = { 46-51 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume18/number2/2320-2782/ },
doi = { 10.5120/2320-2782 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:05:17.888856+05:30
%A T.M Bhraguram
%A S.Shermin
%T Random Photon Key Pasting (RPKP) for Secure Optical Data Transport in Quantum Key Distribution
%J International Journal of Computer Applications
%@ 0975-8887
%V 18
%N 2
%P 46-51
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper we proposed a new mutually authenticated method, ie Random Photon Key Pasting (RPKP) for secure data transmission which is already running under Quantum key distribution. RPKP is method which is trying to paste randomly generated number to the private key as log form and invoked from a trusted third party. The random numb will be completely based on the System level and it is highly depending on the time of the transmission, properties of the Source and destination and also the priority level. We are proposing separate protocol for Priority level key generation and property level communication establishment. The Time module is controlling the key pasting strategy. Quantum cryptography capitalizes on the inherent random polarization state of single photons, which are associated with binary logic values. Because the polarization state of a photon is not reproducible by an eavesdropper between the source and the destination, polarized photons are used with an intelligent algorithm to disseminate the cryptographic key with high security from he source to the destination, a process known as quantum key distribution. However, although the polarization state of a photon remains intact in free-space propagation, it does not remain so in dielectric medium and thus quantum cryptography is not problem-free.

References
  1. C. H. Bennett and G. Brassard, “Quantum cryptography: Public-key distribution and tossing,” in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, IEEE Press, 1984, pp.175-179.
  2. A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Phys. Rev. Lett, vol. 67, pp. 661-663, 2008.
  3. C. H. Bennett, G. Brassard, N. D.MERMIN, “Quantum cryptography without Bell’s theorem,” Phys. Rev. Lett, vol. 68, pp. 557-559, 2007.
  4. C. H. Bennett, “Quantum cryptography using any two nonorthogonal states,” Phys. Rev. Lett, vol. 68, pp. 3121-3124, 2007.
  5. D. Bruß, “Optimal eavesdropping in quantum cryptography with six states,” Phys. Rev. Lett, vol. 81, pp. 3108-3021, 2008.
  6. G L Long, and X. S. Liu, “Theoretically efficient high-capacity quantum-key-distribution scheme,” Phys. Rev. A, vol. 65, 032302, 2003.
  7. Y. Guo, and G. H. Zeng, “Deterministic quantum key distribution using two non-orthogonal entangled states,” Commun. Theor. Phys, vol. 47, pp. 459-463, 2007.
  8. X. L. Zhang, Y. X. Zhang, and K. L. Gao, “Quantum key distribution Phys, vol. 47, pp. 459-463, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Quantum key distribution Entanglement swapping Authentication Bell-basis measurement