| Literature DB >> 28406240 |
Hong Lai1, Ming-Xing Luo2, Josef Pieprzyk3, Jun Zhang4, Lei Pan4, Shudong Li5,6, Mehmet A Orgun7,8.
Abstract
Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix multiplication, which is implemented and optimized in modern computers. Most importantly, considerably information capacity can be improved effectively and efficiently by the recursive property of Fibonacci and Lucas matrices, thereby avoiding the restriction of physical conditions, such as the communication bandwidth.Entities:
Year: 2017 PMID: 28406240 PMCID: PMC5390254 DOI: 10.1038/srep46302
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
and , where n = 2, 3, 4, 5.
| 2 | 3 | 4 | 5 | |
|---|---|---|---|---|
| | | | | |
Figure 1A schematic diagram for the Fibonacci- and Lucas- valued entanglement spontaneous parametric down conversion (SPDC) QKD.
Alice and Bob connect to an entangled SPDC source by optical links. There is a C, a D1 and a D2 OAM sorter in Alice’s and Bob’s laboratories respectively. Either of the two entangled photons coming out from the SPDC source goes to Alice’s and Bob’s laboratories, and then the entangled photon randomly goes through the C, D1 or D2 sorter. The C sorter is used for allowing photons to arrive at the arrays of single-photon detectors when they are Fibonacci values. The D1/D2 sorter is used for filtering and blocking any non-Fibonacci values against various possible problems, and the D1 and the D2 sorters are used for allowing “diagonal” superpositions of the form and , respectively. Here, PBS stands for a polarized beam splitter.
Figure 2The experimental setup for the QKD protocol based on passive detected-state Fibonacci- and Lucas-valued entangled states.
; . and are two-photon output Fibonacci and Lucas entangled states, respectively.
The possible Fibonacci values obtained by Alice and their corresponding classical representations.
| The possible Fibonacci values obtained by Alice | 3 | 5 | 8 | 13 | 21 | 34 |
| The classical bits sent by Alice/Bob | 00 | 01 | 0 | 10 | 11 | 1 |
Performance comparison of our QKD with the most relevant previous QKDs.
| Protocols | Ref. | Ref. | Ref. | Our protocol |
|---|---|---|---|---|
| The maximal information capacity | 1 | 2 | 4 | |
| The correction ability | n/a | n/a | n/a | Higher than 93.33% |
| The ability to verify the integrity of ciphertext | No | No | No | Yes |
| The limitation to bandwidths | Yes | Yes | Yes | No |
| Achieving longer distances and lower error rates | No | No | No | Yes |
denotes the length of the key, “n/a” which means not applicable.
and , where n = 4, 5, 6, 7.
| 4 | 5 | 6 | 7 | |
|---|---|---|---|---|
| | | | | |