Authors:
Tamal Deb,Jyotsna Kumar Mandal,Deeptanu Sen,DOI NO:
https://doi.org/10.26782/jmcms.2025.08.00007Keywords:
Entanglement,Guard Qubit,QKD,Qiskit,Secret Key,Abstract
Built based on the fundamental principles of quantum mechanics, Quantum Key Distribution (QKD) enables secure communication for distant parties. Entanglement-based protocols are a type of QKD protocol that uses the phenomenon of entanglement for detecting eavesdroppers between two communicating parties. In this paper, a novel QKD protocol is devised that uses the concept of superdense coding and padding bits to share the one-time pad, i.e., the key. The super dense coding is achieved by sharing a pre-existing entangled pair of qubits by leveraging the beautiful property of entanglement. The communicating parties can share a one-time pad using this protocol securely. This paper will demonstrate this phenomenon using the proposed protocol by showing the experimental results which has been surfaced with IBM Qiskit simulator, and the simulation establishes the applicability of the protocol and shows its effectiveness in detecting eavesdropping attempts while being simple to implement.Refference:
I. Bennett, C. H. and Brassard, G. “Quantum cryptography: Public key distribution and coin tossing.”, International Conference on Computers, Systems and Signal Processing, India, pp. 175-179, (1984). 10.1016/j.tcs.2014.05.025.
II. Cariolaro, G. “Quantum communications”. Springer Vol. 2, (2015), 10.1007/978-3-319-15600-2
III. Ekert, A. K. “Quantum cryptography based on Bell’s Theorem”. Physical Review Letter, Vol. 67, Issue 6, pp. 661-663, (1991), 10.1103/PhysRevLett.67.661
IV. Gao, F., Liu, B., Wen, Q., Chen, H. “Quantum Key Distribution: Simulation and Characterizations”. Elsevier Procedia Computer Science, Volume 65, pp. 701, (2015), 10.1016/j.procs.2015.09.014
V. Gujar S.S. “Exploring Quantum Key Distribution”. 2nd DMIHER Int. Conf. on Artificial Intelligence in Healthcare, Education and Industry (IDICAIEI), pp. 1–6. IEEE, (2024), 10.1109/IDICAIEI61867.2024.10842847
VI. Mermin, N. D. “Quantum Computer Science: An Introduction.” Cambridge University Press, ISBN-13: 978-0521876582. (2007)
VII. Mina, M.Z., Simion, E. “A Scalable Simulation of the BB84 Protocol Involving Eavesdropping”. Innovative Security Solutions for Information Technology and Communications, pp. 91–109, Springer International Publishing, Cham, (2021), 10.1007/978-3-030-69255-1_7
VIII. Nielsen, M. A. and Chuang, I. L. “Quantum Computation and Quantum Information”, Cambridge University Press, ISBN-13: 978-0521635035, (2000).
IX. Pirandola, S. et al. “Advances in quantum cryptography”. Adv. Opt. Photonics 12, pp. 1012–1236, (2020), 10.1364/AOP.361502
X. Portmann, C. and Renner, R. “Cryptographic security of quantum key distribution”. arXiv:1409.3525v1, (2014), 10.48550/arXiv.1409.3525
XI. Reddy, S., Mandal, S. and Mohan, C. “Comprehensive Study of BB84, A Quantum Key Distribution Protocol, (2023), 10.13140/RG.2.2.31905.28008.
XII. Shaik E. H. and Nakkeeran R. “Implementation of Quantum Gates based Logic Circuits using IBM Qiskit”. International Conference on Computing, Communication & Security, (2020), 10.1109/ICCCS49678.2020.9277010