Quantum secure direct communication (QSDC) is a branch of quantum cryptography which exploits laws of physics and was recently proposed for securing information transferred from sender to receiver without relying on computational complexity. Instead of an entangled photon, the quantum cryptography employs two other approaches, single photon and multiphoton for encoding the messages. The multiphoton was proposed to outperform the weaknesses of a single photon by introducing the multiplicity of a photon to perform data encryption tasks. Despite the advantages of multiphoton, the transmission time to transfer the encoded data is still regarded as a critical issue. Most of the multiphoton approaches require multiple photons to travel along a number of stages. Moreover, extra time is needed to change the polarization angle of the optical device for encoding purposes. These situations have resulted in an increase in source redundancy, which subsequently leads to an increase in the transmission time. In this paper, a compression message approach is proposed to mitigate the substantial increase in time used for the data transmission processes. The proposed compression approach, namely, hybrid M-ary in a braided single stage (HMBSS) is based on the lossless data encoding such that the number of photons is reduced in the data transmission stage. Extensive simulation experiments have been conducted to test the performance of the proposed approach against some selected multiphoton approaches. The results show that the proposed approach outperforms braided single-stage, M-ary three-stage and initialization vector in terms of reducing total average transmission time to encode the photon by about 75.9% and 91.7%, respectively. Furthermore, the HMBSS reduces the overhead on the transmission channel by minimizing the number of message's bits by about 45% in average even when the length of the message increases during the transmission as compared to others.INDEX TERMS Encoding, lossless compression, multiphoton, multistages, polarization state.
In recent years, 5G networks and services become progressively popular among telecommunication providers. Simultaneously, the growth in the usage and deployment of smartphone platforms and mobile applications have been seen as phenomenal. Therefore, this paper discusses the current state of the art of 5G technology in the merger of unconditional security requirements referred to as Quantum Cryptography. The various domain of Quantum Cryptography is illustrated including the protocols available, their functionality and previous implementation in real networks. This paper further identifies research gaps covering critical aspects of how Quantum Cryptography can be realized and effectively utilized in 5G networks. These include improving the current technique in Quantum Cryptography through efficient key distribution and message sharing between users in 5G networks.
The security of Quantum Secure Direct Communication (QSDC) and its authentication procedure based on multiple stages is analyzed. The security analysis shows that the process of authentication is required to be done three times based on the usage of unitary transformation that is only known between Alice and Bob. In the proposed protocol, a secure quantum handshake is utilized to share the secret polarization angle and an authentication key at the initial stage of authentication over the quantum channel. The symmetry key is used in this work to protect user data communication within the QSDC protocol, where the same secret key is used to encrypt and decrypt the message. This work adopts the information travel time (ITT) by allowing the sender to detect any interference from third parties. In addition, the operation of the Pauli-X quantum gate increases Eve’s difficulty in stealing the information. The information transmitted is then continued by sending photons once in the quantum channel, which improves the efficiency without losing the message’s security. In addition, to securely transfer the stream of messages, the proposed protocol is operated in single-stage, and the authentication is applied bit-by-bit, thus reducing the transmission time. Security checks are carried out along the data transmission process. Compared to previous protocols, this new initial authentication protocol has remarkable advantages since it does not require public communication to pre-share the authentication key and secret angles before the onset of the transmission, therefore, reducing the communication cost. Moreover, the secret authentication key and polarization angles are updated after a number of bits are sent to increase the security level. The verification process is also conducted to ensure the symmetry of the sender and receiver. The analyses presented herein demonstrate that the proposed authentication protocol is simple and secure in order to ensure the legitimacy of the users.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.