Document Type : Original Article

Authors

1 Faculty of Physics, Alzahra University, Tehran, Iran

2 Department of Computer Engineering, Bu-Ali Sina University, Hamedan, Iran

Abstract

The secure transfer of keys between two parties, is one of the primary problems in cryptography. The possibility that the key can be manipulated or intercepted by way of an eavesdropper is the cause for the concern. A promising way to this problem is Quantum Key Distribution (QKD). The secure distribution of keys that may be used to encrypt and decrypt messages is made feasible by this approach, which makes use of the idea of quantum mechanics. QKD offers a degree of protection that can not be done by means of classical cryptography techniques, and has remarkable capability for application in a scope of fields in which secure correspondence is crucial. QKD is a field of study that has brought various conventions pointed toward empowering the safe alternate of cryptographic keys between two parties, Alice and Bob. Two key protocols within this field are the BB84 which was designed by Bennett and Brassard and E91 which was proposed by Ekert. While other protocols have been developed, many draw inspiration from these two foundational approaches. We focused specifically on the E91 protocol and explored its potential for the safe transfer of entangled pairs within computer networks. This protocol utilizes entanglement between particles as a means of verifying the security of the key exchange. Our investigation centered around testing the entanglement swapping for two particles using the E91 protocol, with the aim of developing a novel method for the secure transmission of entangled pairs via computer networks. Our findings suggest promising avenues for future work in implementing secure entanglement swapping in practical applications.

Keywords

Main Subjects

  1. C H Bennett and G Brassard,  Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, 175 (1984) 8.
  2. A K Ekert, Rev. Lett. 67  (1991) 661.
  3. W K Wootters and W H Zurek, Nature, 299 (1982) 802.
  4. R Horodecki, P Horodecki and M Horodecki, K Horodecki, Mod. Phys, 81 (2009) 865.
  5. A Einstein, B Podolsky and N Rosen,  rev. 47 (1935) 777.
  6. M A Nielsen and I L Chuang, Contemp Phys, 52 (2011) 604.
  7. Barnett, Quantum information, Oxford University Press, (2009) 16.
  8. J S Bell, Physics Physique Fizika, 1 (1964) 195.
  9. P X Chen, S Y Zhu and G C Guo, Rev. A, 74 (2006) 032324.
  10. S L Braunstein, A Mann and M Revzen, Rev. Lett. 68 (1992) 3259.
  11. D M Greenberger, M A Horne and A Zeilinger (2007), Bell's Theorem Quantum Theory and Conceptions of the Universe, 69 (1989).
  12. M Zukowski, A Zeilinger, M A Horne and A K Ekert, Rev. Lett, 71 (1993) 4287.
  13. J M Torres, J Z Bernad and G Alber, Rev. A, 90 (2014) 012304.
  14. K Shannon, E Towe and O Tonguz, On the Use of Quantum Entanglement in Secure Communications: A Survey, Book, (2020).
  15. R M Needham and M D Schroeder, Communications of the ACM, 21 (1978) 993.
  16. C Blundo and P D Arco, Journal of Cryptography, 18 (2005) 391.
  17. C H Bennett, G Brassard, C Crépeau, R Jozsa, A Peres and W K Wootters, Rev. Lett. 70 (1993) 1895.
  18. S Bose, V Vedral, and P L Knight, Rev. A, 57 (1998) 822.
  19. J W Pan, D Bouwmeester, H Weinfurter, and A Zeilinger, Rev. Lett. 80 (1998) 3891.
  20. K M Sung, H Jino, H Chang-Ho, Y Hyungjin, M Sung and S Wook, Quantum Information Processing, 19 (2020).
  21. D Gottesman and I L Chuang, Nature, 402 (1999) 390.
  22. R V Meter, T Satoh, T D Ladd, W J Munro and K Nemoto, Networking Science, 3 (2013) 82.

 

ارتقاء امنیت وب با وف ایرانی