SlideShare a Scribd company logo
1 of 8
Download to read offline
TELKOMNIKA Telecommunication Computing Electronics and Control
Vol. 20, No. 4, August 2022, pp. 707~714
ISSN: 1693-6930, DOI: 10.12928/TELKOMNIKA.v20i4.22796  707
Journal homepage: http://telkomnika.uad.ac.id
Secure quantum key distribution system by applying decoy
states protocol
Sura Adil Abbas, Nael A. Al-Shareefi
Department of Communication and Mobile Computing Engineering, Faculty of Engineering, University of Information Technology and
Communications (UOITC), Baghdad, Iraq
Article Info ABSTRACT
Article history:
Received Jan 08, 2022
Revised Apr 19, 2022
Accepted May 01, 2022
Secure quantum key distribution (QKD) promises a revolutionizing in
optical applications such as encryption, and imaging. However, their
implementation in real-world scenarios continues to be challenged. The goal
of this work is to verify the presence of photon number splitting (PNS)
attack in quantum cryptography system based on BB84 protocol and to
obtain a maximum secure key length as possible. This was realized through
randomly interleaving decoy states with mean photon numbers of 5.38,
1.588, and 0.48 between the signal states with mean photon numbers of 2.69,
0.794, and 0.24. Experiment results show that a maximum secure key length
obtained from our system, which ignores eavesdropping cases, is 125 with
20% decoy states and 82 with 50% decoy states for mean photon number of
0.794 for signal states and 1.588 for decoy states.
Keywords:
BB84 protocol
Decoy states protocol
PNS
Quantum cryptography
This is an open access article under the CC BY-SA license.
Corresponding Author:
Sura Adil Abbas
Department of Communication and Mobile Computing Engineering, Faculty of Engineering
University of Information Technology and Communications (UOITC), Baghdad, Iraq
Email: sura.adel@uoitc.edu.iq
1. INTRODUCTION
Fifth generation (5G) won’t fit all the demands of the future in 2025 and beyond. Sixth generation
(6G) wireless communication networks are expected to improve cost/energy/efficiency spectrum and
security [1], [2]. 6G networks will rely on new enabling technologies such as quantum computing to meet
these requirements. A massive investment has been made in quantum technologies, particularly in the field of
quantum computing. Notwithstanding, such developments of quantum computers threaten internet security,
easily break down classical encryption and leak private information into malicious adversaries. Hence,
quantum secure communication technologies and quantum encryption are the focus of investor interest.
In particular, quantum key distribution (QKD) is said to be a secure communication technology that is
apparent in the presence of the eavesdropper, Eve, who has unlimited power to break the encryption. Since
the invention of the first QKD BB84 protocol in 1984, many researchers have participated in this field to
achieve this exciting concept [3].
Several different works have been recently reported to remove attacks on real device defects from
theoretical security proofs, such as reference [4]. Nevertheless, Yuen [5], [6] has discovered in theory that even
real devices work perfectly along with the standardized theories, there are problems even in theory. Ali et al. [7]
conducted both a theoretical investigation and an experimental implementation of weak decoy and vacuum
states on ID-3000 commercial QKD system for increasing the performance of the system. The type of attack
investigated was a photon number splitting (PNS) attack. Lo et al. [8] used Gottesman-Lo-LΓΌtkenhaus-Preskill
(GLLP) method to prove the security of QKD based on a phase randomized weak coherent state source.
The distance increased from 30 km with BB84 protocol to 140 km with decoy states protocol. To bridge the
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 707-714
708
gap between theory and practice, decoy-state measurement-device-independent QKD (mdiQKD) has been
proposed, [9]. Nevertheless, its experimental complexity is inappropriate for practical applications [10]-[12].
In addition, the key secret key is very weak with current technology [13], [14]. Also, measurement device
independent quantum key distribution (MDI-QKD), allows removing any presumption of confidence from
the measuring device, which can be said that the weakest part of QKD realizations [15]-[18].
Using single photon sources in QKD, a perfect secure key is obtained, i.e. eavesdropper would be
detected. Utilizing sources of single photons eavesdropper can be detected by monitoring the receiver’s
quantum bit error rate (QBER) [19]. when an eavesdropper, Eve, gets information, she changes the
distribution of the key. This introducing errors in the correlations between the sender and receiver.
Eve measurement modifies the state itself [20]. In the current technology, no single-photon devices are
available; the best option in quantum key distribution system substitute’s single-photon source in QKD BB84
protocol by heavily attenuated laser pulses, these sources obey Poisson distribution, as shown in Figure 1 [17].
Poisson distribution for several values of mean photon number πœ‡ of Figure 1(a) 0.1, Figure 1(b) 1, Figure 1(c) 5,
and Figure 1(d) 10. These sources have pulses traveling from sender to receiver contain more than one
photon, opening the door for a weakness in system security [21]. Heavily attenuated laser pulses source
output enables eavesdropper to share some information through a PNS attack.
(a) (b)
(c) (d)
Figure 1. Poisson distribution for several values of mean photon number πœ‡ of (a) 0.1, (b) 1, (c) 5, and (d) 10
In this paper, the security of a QKD system has been enhanced by applying decoy states protocol
against photon PNS. By randomly interleaving fake states (decoy states) with mean photon numbers of 5.38,
1.588, and 0.48 within the transmitted signal of 2.69, 0.794, and 0.24 mean photon numbers, a PNS has been
detected and a secure key has been gotten. The signal states and decoy states were compared to check the
efficiency of the system and detect the PNS attack. The average length for a secure key obtained from our
system, which ignores eavesdropping cases, is 125 with 20% decoy states and 82 with 50% decoy states.
The paper is organized as: sections 2 and section 3 give a brief description of the PNS attack
strategy and main concepts of the decoy-state protocol. Sections 4 and section 5 detail the experimental work
and results. Finally, the conclusion is given in section 6.
2. PHOTON NUMBER SPLITTING ATTACK
PNS is a quite powerful attack described by LΓΌtkenhaus. By using attenuated laser pulses instead of
the ideal single-photon as the source in BB84 QKD systems, the distribution of photons is as follows.
The pulses with no photons decrease the signal rate since no signal will be detected by Bob. The pulses with
single PNS is a quite powerful attack described by LΓΌtkenhaus. By using attenuated laser pulses instead of
the ideal single-photon as the source in BB84 QKD systems, the distribution of photons is [22]:
βˆ’ The pulses with single-photon work perfectly.
βˆ’ The pulses with multi-photons are the problematic part. They have more than one copy of the
polarization information, allowing Eve to split off a copy of the information without Alice and Bob
knowing it.
TELKOMNIKA Telecommun Comput El Control 
Secure quantum key distribution system by applying decoy states protocol (Sura Adil Abbas)
709
βˆ’ The pulses with multi-photons are the problematic part. They have more than one copy of the
polarization information, allowing Eve to split off a copy of the information without Alice and Bob
knowing it.
In the PNS attack, Eve knows the number of photons on each signal sent by Alice without disturbing
its polarization by a quantum non-demolition measurement. Eve works on the signal depending on the total
number of photons. More precisely, the existence of multi-photon signals permits Eve to execute the PNS
attack. Photon work perfectly.
βˆ’ When Eve finds empty pulses, she sends them back to Bob without further errors.
βˆ’ When she finds the pulses with multi-photons, she steals one photon and retains it in her memory and
sends the remainder to Bob. When Eve sends a reminder to Bob, the original lossy quantum channel
may be replaced by a lossless channel. Eve’s does not change the signal polarization either in the
photon she sends on nor in the photon she splits off. Subsequently, in the protocol Alice will announce
the basis of the polarization of the signal. This will allow Eve to make the correct measurement on the
photon she split off, thus getting perfect information about the polarization of Alice’s signal.
βˆ’ When it is one photon, she just blocks it.
3. DECOY STATE PROTOCOL
The protocol of decoy-state has been proposed for detecting PNS attack, improving transmission
distance and rate of the generated secure key of the QKD system [7]. By applying the protocol of decoy-state,
Alice implements a BB84 protocol with mean photon number of the signal source (πœ‡π‘ ) and replaces randomly
with a mean photon number πœ‡π‘‘ (decoy-source). Eve cannot modify the transmission of the channel for more
than one value of mean photon number (πœ‡) simultaneously. Eve treats single-photon signals from πœ‡π‘  or πœ‡π‘‘
identically because she does not know which one of πœ‡ is Alice used. Bob sends an acknowledgement of receipt
of signals then Alice broadcasts pulses of signal states and pulses of decoy states. The rate of single-photon
signals differ for each πœ‡, so Alice and Bob analyze separately the QBER of signal and decoy-state, since all
characteristics of signal state and decoy-state are similar except πœ‡. The number of detection events from πœ‡π‘  and
πœ‡π‘‘ transmissions will be compared to give an estimation bounds of the single-photon transmitted on the
channel. PNS attack will be caught because of the modification in the QBER of the system or transmittance
characteristics of decoy states and/or signal states. Decoy states are fake states used only for catching an
eavesdropper, but not for a key generation [23]. In decoy protocol, let’s assume that heavily attenuated laser
pulses source contains a single photon with a 90% probability, then multi-photons with a probability of 10%
generated randomly, the problem is not known when the multi-photon pulses have been emitted. Let the
channel loss (β„“) equal to 90%, then it has a 10% yield (𝑄).
𝑄 = 1 βˆ’ β„“ (1)
By calculating the yield of decoy source, the eavesdropper can be detected. If attenuated laser pulses
are used as a source in the QKD system, the fraction of multiphoton counts is called the fraction of tagged
photons (βˆ†). It is a crucial value. Decoy-state protocol improved by Hwang [24] is an important method for
the unconditional security of QKD with attenuated laser pulses to verify the upper bound of βˆ†. The verified
upper bound of βˆ† in case of no eavesdropping is given by [25].
βˆ†=
πœ‡π‘ π‘’βˆ’πœ‡π‘ 
πœ‡π‘‘π‘’βˆ’πœ‡π‘‘
(2)
By neglecting the pulses which had no light (πœ‡0 = 0), βˆ† is given by:
βˆ†β‰€ βˆ†π‘–=
πœ‡π‘ 
πœ‡π‘‘βˆ’πœ‡π‘ 
(
πœ‡π‘  π‘’βˆ’πœ‡π‘  𝑄𝑑
πœ‡π‘‘ π‘’βˆ’πœ‡π‘‘ 𝑄𝑠
βˆ’ 1) (3)
Where:
βˆ†π‘– = minimum value of tagged photon for the PNS attack.
𝑄𝑠 = detection probability of signal pulses.
𝑄𝑠 =
π‘›π‘œ. π‘œπ‘“ π‘ π‘–π‘”π‘›π‘Žπ‘™ π‘‘π‘’π‘‘π‘’π‘π‘‘π‘–π‘œπ‘›π‘ 
π‘›π‘œ. π‘œπ‘“ π‘ π‘–π‘”π‘›π‘Žπ‘™ π‘ π‘‘π‘Žπ‘‘π‘’π‘ 
𝑄𝑑 = detection probability of the decoy pulses.
𝑄𝑑 =
π‘›π‘œ. π‘œπ‘“ π‘‘π‘’π‘π‘œπ‘¦ π‘‘π‘’π‘‘π‘’π‘π‘‘π‘–π‘œπ‘›π‘ 
π‘›π‘œ. π‘œπ‘“ π‘‘π‘’π‘π‘œπ‘¦ π‘ π‘‘π‘Žπ‘‘π‘’π‘ 
The flowchart shown in Figure 2 represents decoy state protocol.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 707-714
710
Figure 2. Block diagram of the BB84 protocol with decoy-state
4. EXPERIMENTAL WORK AND RESULTS
Figure 3 and Figure 4 show block diagram and experimental set up of our implemented QKD
system based on the BB84 protocol. The transmitter side of the system has four laser diodes that are
connected to personal computer (PC) through driver circuits. Trigger signals generated by PC, shown in
Figure 5(a), fed driver circuits to generate an electrical signal that is used to operate each laser diode.
Signal-states are emitted by running one laser diode randomly during one loop of program execution.
The value of πœ‡ in the system was controlled by reducing the intensity of the optical signal emitted from each
laser diodes by using optical filters shown in Figure 5(b). Decoy-states (fake states) are produced by deriving
two laser diodes concurrently, as shown in Figure 6. Decoy-states are interleaved randomly between the signal
states within the four laser diodes operating loop of the system. The pulse duration for the electrical signal that
is used to operate laser diodes was 200 ns at 11 kHz. The system was running with the BB84 protocol with and
without decoy states. The numbers of total random bit generated from PC was equal to 𝑁 = 30000.
A comparison between these two cases was accomplished in order to detect a PNS attack. A program is
written in MATLAB R2015a in order to analyze the results of the comparison. In this system, eavesdropping
is checked for two types of decoy-states, 1-state decoy, i.e. (20%), and 4-states, i.e. (50%). For each type, two
laser diodes were operated simultaneously. The beam splitter (PNS) was applied for all measurements. In the
receiver side, for single-photon avalanche photodiode (APD) operating in Geiger mode, two excess voltage
were used (𝑉𝐸 = 5 V and 𝑉𝐸 = 7 V) at temperature -11 o
C. Figure 7 shows the tests carried out for APD counts
when one laser diode (LD) on (signal-states) Figure 7(a) and two LDs on (decoy-states) Figure 7(b).
BB84 protocol including privacy amplification stages and error correction was applied to obtain the final key.
Keys were extracted for QBER less than 15%. The tests are listed in the diagram shown in Figure 8.
TELKOMNIKA Telecommun Comput El Control 
Secure quantum key distribution system by applying decoy states protocol (Sura Adil Abbas)
711
Figure 3. Quantum key distribution system for the BB84 protocol
LD: laser diode, BS: beam splitter, PBS: polarizing beam splitter, APD: avalanche photodiode, πœ†/2: half-wave
plate, and PC: personal computer.
Figure 4. The setup of quantum cryptography system in the lab
Figure 5. PC signals and triggering signals for LD1:
(a) PC signals and (b) firing pulse
Figure 6. Decoy states pulses
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 707-714
712
(a) (b)
Figure 7. Number of counts as a response for: (a) one LD on (signal states) and (b) two LDs on (decoy states)
Figure 8. Measurements and calculations block diagram
Tables 1 and Table 2 show the average values of final key length with PNS attack for two voltage
values 𝑉𝐸 = 5 V, 7 V and without PNS attack for 𝑉𝐸 = 5 V,7 V and for (πœ‡π‘  = 0.24) by applying high
attenuation on the transmitted signal and (πœ‡π‘  = 0.794) with less attenuation respectively. The results give for
20% and 50% decoy states.for high attenuation (πœ‡π‘  = 0.24) the un appropriate to the system, while by using
(πœ‡π‘  = 0.794) secure keys have been obtained.
TELKOMNIKA Telecommun Comput El Control 
Secure quantum key distribution system by applying decoy states protocol (Sura Adil Abbas)
713
Table 1. Average values of the final key lengths with and without PNS attack for 𝑉𝐸 = 5 V, 7 V and πœ‡π‘  = 0.24
𝑉𝐸/V
Average final un attacked key length Average final attacked key length
20% decoy states 50% decoy states 20% decoy states 50% decoy states
5 83 65 76 46
7 96 55 77 47
Table 2. Average values of the final key lengths with and without PNS attack for 𝑉𝐸 = 5 V, 7 V and πœ‡π‘ = 0.794
𝑉𝐸/V
Average final un attacked key length Average final attacked key length
20% decoy states 50% decoy states 20% decoy states 50% decoy states
5 125 82 104 64
7 140 80 132 63
5. CONCLUSIONS
From our work the maximum average secure key length obtained was equal to 125 with 20 % decoy
states and 82 with 50% decoy states which is considered to be short with maximum key length of 388 which
was obtained from the same system by applying the BB84 protocol without decoy states. But the security of
key is not guaranteed as far as the presence of Eve was not tested. The results obtained with, APD
temperature = -11 ΒΊC and distance = 85 cm, the best values of πœ‡ to give secure key with QBER < 15%
satisfying βˆ†< βˆ†π‘– is (πœ‡π‘  = 0.794) for both cases of using 20% and 50% decoy states with BB84 protocol with
𝑉𝐸 = 5 V.
REFERENCES
[1] N. A. Al-Shareefi, S. A. Abbas, M. S. Alkhazraji, and A. A. R. Sakran, "Towards secure smart cities: design and implementation
of smart home digital communication system," Indonesian Journal of Electrical Engineering and Computer Science (IJEECS),
vol. 21, no. 1, pp. 271–277, Jan. 2021, doi: 10.11591/ijeecs.v21.i1.pp271-277.
[2] N. A. Al-Shareefi, J. Aldhaibaini, S. Abbas, and H. Obaid, "Comparison of Three Different EOU Techniques for Fifth-Generation
MM-W Wireless Networks," Iraqi Journal for Computers and Informatics, vol. 45, no. 2, pp. 9-14, 2019,
doi: 10.25195/ijci.v45i2.47.
[3] T. Iwakoshi, "On problems in security of quantum key distribution raised by Yuen," Proceedings Quantum Information Science
and Technology III, 2017, vol. 10442, doi: 10.1117/12.2278625.
[4] K. Tamaki, M. Curty, and M. Lucamarini, "Decoy-state quantum key distribution with a leaky source," New Journal of Physics,
vol. 18, pp. 1-24, 2016, doi: 10.1088/1367-2630/18/6/065008.
[5] H. P. Yuen, "Fundamental quantitative security in quantum key generation," Physical Review A, vol. 82, 2010,
doi: 10.1103/PhysRevA.82.062304.
[6] H. P. Yuen, "Universality and The Criterion d in Quantum Key Generation," arXiv, 2009. [Online]. Available:
https://arxiv.org/abs/0907.4694
[7] S. Ali, S. Saharudin, and M. R. B. Wahiddin, "Quantum key distribution using decoy state protocol," American Journal of
Engineering and Applied Sciences, vol. 2, no. 4, pp. 694-698, 2009. [Online]. Available:
https://thescipub.com/pdf/ajeassp.2009.694.698.pdf
[8] H. -K. Lo, X. Ma, and K. Chen, "Decoy state quantum key distribution," Physical review letters, vol. 94, 2005,
doi: 10.1103/PhysRevLett.94.230504.
[9] H. -K. Lo, M. Curty, and B. Qi, "Measurement-device-independent quantum key distribution," Physical review letters, vol. 108,
2012, doi: 10.1103/PhysRevLett.108.130503.
[10] B. Hensen et al., "Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres," Nature, vol. 526,
pp. 682-686, 2015, doi: 10.1038/nature15759.
[11] M. Giustina et al., "Significant-loophole-free test of Bell’s theorem with entangled photons," Physical review letters, vol. 115,
2015, doi: 10.1103/PhysRevLett.115.250401.
[12] L. K. Shalm et al., "Strong Loophole-Free Test of Local Realism," Physical review letters, vol. 115, 2016,
doi: 10.1103/PhysRevLett.115.250402.
[13] N. Gisin, S. Pironio, and N. Sangouard, "Proposal for implementing device-independent quantum key distribution based on a
heralded qubit amplifier," Physical review letters, vol. 105, 2010, doi: 10.1103/PhysRevLett.105.070501.
[14] M. Curty and T. Moroder, "Heralded-qubit amplifiers for practical device-independent quantum key distribution," Physical
Review A, vol. 84, 2011, doi: 10.1103/PhysRevA.84.010304.
[15] N. A. Al-Shareefi, J. A. Aldhaibaini, S. A. Abbas, and H. S. Obaid, "Towards 5G millimeter-wave wireless networks: a
comparative study on electro-optical upconversion techniques," vol. 20, no. 3, pp. 1471-1478, Dec. 2020,
doi: 10.11591/ijeecs.v20.i3.pp1471-1478.
[16] Y. Zhao, C. -H. F. Fung, B. Qi, C. Chen, and H. -K. Lo, "Quantum hacking: Experimental demonstration of time-shift attack
against practical quantum-key-distribution systems," Physical Review A, vol. 78, 2008, doi: 10.1103/PhysRevA.78.042333.
[17] N. A. Al-Shareefi, S. I. S. Hassan, F. Malek, R. Ngah, and S. A. Abbas, "Optical Generation of 60 GHz Downstream Data in
Radio over Fiber Systems Based on Two Parallel Dual-Drive MZMs," International Journal of Engineering and Technology
(IJET), vol. 6, no. 2, pp. 579-587, 2014. [Online]. Available: https://www.enggjournals.com/ijet/docs/IJET14-06-02-026.pdf
[18] N. A. Al-Shareefi and A. A. Sakran, "A novel optimal small cells deployment for next-generation cellular networks,"
International Journal of Electrical and Computer Engineering (IJECE), vol. 11, no. 6, pp. 5259-5265, 2021,
doi: 10.11591/ijece.v11i6.pp5259-5265.
[19] A. Gaidash, V. I. Egorov, and A. V. Gleim, "Revealing of photon-number splitting attack on quantum key distribution system by
photon-number resolving devices," Journal of Physics: Conference Series, 2016, vol. 735, doi: 10.1088/1742-6596/735/1/012072.
[20] J. Hasegawa, M. Hayashi, T. Hiroshima, and A. Tomita, "Security analysis of decoy state quantum key distribution incorporating
finite statistics," arXiv, 2007. [Online]. Available: https://arxiv.org/abs/0707.3541
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 707-714
714
[21] A. Niederberger, V. Scarani, and N. Gisin, "Photon-number-splitting versus cloning attacks in practical implementations of the
Bennett-Brassard 1984 protocol for quantum cryptography," Physical Review A, vol. 71, 2005,
doi: 10.1103/PhysRevA.71.042316.
[22] X. Ma, "Quantum cryptography: from theory to practice," arXiv, 2007. [Online]. Available: https://arxiv.org/pdf/0808.1385.pdf
[23] D. Rosenberg et al., "Long-distance decoy-state quantum key distribution in optical fiber," Physical review letters, vol. 98, 2007,
doi: 10.1103/PhysRevLett.98.010503.
[24] W. -Y. Hwang, "Quantum key distribution with high loss: toward global secure communication," Physical Review Letters,
vol. 91, 2003, doi: 10.1103/PhysRevLett.91.057901.
[25] X.-B. Wang, "Decoy-state protocol for quantum cryptography with four different intensities of coherent light," Physical Review
A, vol. 72, 2005, doi: 10.1103/PhysRevA.72.012322.
BIOGRAPHIES OF AUTHORS
Sura Adil Abbas received the Bachelor of electronic and communication
engineering from University of Baghdad /collage of engineering /department of electronic and
communication engineering / Iraq / Baghdad/ Aljaderiyah, in 2005. The Masters. Degree in
electronic and communication engineering from University of Baghdad/institute of laser for
postgraduate studies / Iraq / Baghdad / Aljaderiyah, in 2011. She is currently working as an
assistant teacher at Department of Communication and Mobile Computing Engineering,
faculty of Engineering, University of Information Technology and Communications (UOITC),
Baghdad, Iraq. She can be contacted at email: sura.adel@uoitc.edu.iq.
Nael A. Al-Shareefi received the B.Sc. degree in electronic and communications
engineering and the M.Sc. degree in communications engineering from the University of
Technology, Baghdad, Iraq, in 1999 and 2001, respectively, and the Ph.D. degree in
communications engineering from Universiti Malaysia Perlis (UniMAP), Malaysia, in 2014.
Since 2019, he has been working as the Head of the Intelligent Medical Systems Department,
College of Biomedical Informatics, University of Information Technology and
Communications (UOITC), Baghdad. His research interests include 60-GHz millimeter-wave
generation, radio-over-fiber, optical fiber communications, and fifth generation of mobile
networks. He received an Associate Professorship at University of Information Technology
and Communications (UOITC), Baghdad, in 2020. He can be contacted at email:
dr.nael.al_shareefi@uoitc.edu.iq.

More Related Content

Similar to Secure quantum key distribution system enhanced with decoy states protocol

Wireless channel-based ciphering key generation: effect of aging and treatment
Wireless channel-based ciphering key generation: effect of aging and treatmentWireless channel-based ciphering key generation: effect of aging and treatment
Wireless channel-based ciphering key generation: effect of aging and treatmentIJECEIAES
Β 
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04IJNSA Journal
Β 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...ieijjournal
Β 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...ieijjournal
Β 
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...cscpconf
Β 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIJNSA Journal
Β 
Performance Evaluation of Secure Key Distribution Based on the B92 Protocol
Performance Evaluation of Secure Key Distribution Based on the B92 ProtocolPerformance Evaluation of Secure Key Distribution Based on the B92 Protocol
Performance Evaluation of Secure Key Distribution Based on the B92 ProtocolIJAEMSJORNAL
Β 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSijcsa
Β 
B03250609
B03250609B03250609
B03250609theijes
Β 
CIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor NetworksCIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor Networksijsrd.com
Β 
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 1547109 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710guestbd2263
Β 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGIJNSA Journal
Β 
Analysis of spectrum
Analysis of spectrumAnalysis of spectrum
Analysis of spectrumcsandit
Β 
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkAn Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkIJCNCJournal
Β 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...IJCNCJournal
Β 
BB84 with Both Several Cloning and Intercept-resend Attacks
BB84 with Both Several Cloning and Intercept-resend Attacks BB84 with Both Several Cloning and Intercept-resend Attacks
BB84 with Both Several Cloning and Intercept-resend Attacks IJECEIAES
Β 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptographySukhdeep Kaur
Β 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...IJTET Journal
Β 

Similar to Secure quantum key distribution system enhanced with decoy states protocol (20)

Wireless channel-based ciphering key generation: effect of aging and treatment
Wireless channel-based ciphering key generation: effect of aging and treatmentWireless channel-based ciphering key generation: effect of aging and treatment
Wireless channel-based ciphering key generation: effect of aging and treatment
Β 
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
VERIFICATION OF QUANTUM CRYPTOGRAPHY PROTOCOLS BY MODEL CHECKING1010ijnsa04
Β 
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wirel...
Β 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
Β 
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Β 
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHYIMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
IMPROVING TLS SECURITY BY QUANTUM CRYPTOGRAPHY
Β 
Secure communication over optical networks
Secure communication over optical networksSecure communication over optical networks
Secure communication over optical networks
Β 
Performance Evaluation of Secure Key Distribution Based on the B92 Protocol
Performance Evaluation of Secure Key Distribution Based on the B92 ProtocolPerformance Evaluation of Secure Key Distribution Based on the B92 Protocol
Performance Evaluation of Secure Key Distribution Based on the B92 Protocol
Β 
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLSA SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
A SURVEY ON QUANTUM KEY DISTRIBUTION PROTOCOLS
Β 
B03250609
B03250609B03250609
B03250609
Β 
CIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor NetworksCIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor Networks
Β 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
Β 
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 1547109 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
Β 
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKINGANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
ANALYSIS OF THE SECURITY OF BB84 BY MODEL CHECKING
Β 
Analysis of spectrum
Analysis of spectrumAnalysis of spectrum
Analysis of spectrum
Β 
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkAn Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
Β 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...
Β 
BB84 with Both Several Cloning and Intercept-resend Attacks
BB84 with Both Several Cloning and Intercept-resend Attacks BB84 with Both Several Cloning and Intercept-resend Attacks
BB84 with Both Several Cloning and Intercept-resend Attacks
Β 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
Β 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
Β 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
Β 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
Β 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
Β 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Β 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Β 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
Β 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
Β 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Β 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
Β 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
Β 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
Β 
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...TELKOMNIKA JOURNAL
Β 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
Β 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
Β 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
Β 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
Β 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
Β 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
Β 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
Β 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Β 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
Β 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Β 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
Β 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Β 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
Β 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Β 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
Β 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
Β 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
Β 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
Β 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
Β 
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4Γ—4 Wallace tree multipli...
Β 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Β 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
Β 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
Β 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Β 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
Β 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
Β 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
Β 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Β 

Recently uploaded

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
Β 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
Β 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
Β 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
Β 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
Β 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
Β 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
Β 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoΓ£o Esperancinha
Β 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
Β 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
Β 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
Β 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
Β 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
Β 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
Β 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
Β 
Study on Air-Water & Water-Water Heat Exchange in a Finned ο»ΏTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ο»ΏTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ο»ΏTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ο»ΏTube ExchangerAnamika Sarkar
Β 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
Β 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
Β 

Recently uploaded (20)

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Β 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Β 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Β 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Β 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Β 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
Β 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Β 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Β 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Β 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Β 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Β 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Β 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Β 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Β 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Β 
young call girls in Rajiv ChowkπŸ” 9953056974 πŸ” Delhi escort Service
young call girls in Rajiv ChowkπŸ” 9953056974 πŸ” Delhi escort Serviceyoung call girls in Rajiv ChowkπŸ” 9953056974 πŸ” Delhi escort Service
young call girls in Rajiv ChowkπŸ” 9953056974 πŸ” Delhi escort Service
Β 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Β 
Study on Air-Water & Water-Water Heat Exchange in a Finned ο»ΏTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ο»ΏTube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned ο»ΏTube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned ο»ΏTube Exchanger
Β 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
Β 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Β 

Secure quantum key distribution system enhanced with decoy states protocol

  • 1. TELKOMNIKA Telecommunication Computing Electronics and Control Vol. 20, No. 4, August 2022, pp. 707~714 ISSN: 1693-6930, DOI: 10.12928/TELKOMNIKA.v20i4.22796  707 Journal homepage: http://telkomnika.uad.ac.id Secure quantum key distribution system by applying decoy states protocol Sura Adil Abbas, Nael A. Al-Shareefi Department of Communication and Mobile Computing Engineering, Faculty of Engineering, University of Information Technology and Communications (UOITC), Baghdad, Iraq Article Info ABSTRACT Article history: Received Jan 08, 2022 Revised Apr 19, 2022 Accepted May 01, 2022 Secure quantum key distribution (QKD) promises a revolutionizing in optical applications such as encryption, and imaging. However, their implementation in real-world scenarios continues to be challenged. The goal of this work is to verify the presence of photon number splitting (PNS) attack in quantum cryptography system based on BB84 protocol and to obtain a maximum secure key length as possible. This was realized through randomly interleaving decoy states with mean photon numbers of 5.38, 1.588, and 0.48 between the signal states with mean photon numbers of 2.69, 0.794, and 0.24. Experiment results show that a maximum secure key length obtained from our system, which ignores eavesdropping cases, is 125 with 20% decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states. Keywords: BB84 protocol Decoy states protocol PNS Quantum cryptography This is an open access article under the CC BY-SA license. Corresponding Author: Sura Adil Abbas Department of Communication and Mobile Computing Engineering, Faculty of Engineering University of Information Technology and Communications (UOITC), Baghdad, Iraq Email: sura.adel@uoitc.edu.iq 1. INTRODUCTION Fifth generation (5G) won’t fit all the demands of the future in 2025 and beyond. Sixth generation (6G) wireless communication networks are expected to improve cost/energy/efficiency spectrum and security [1], [2]. 6G networks will rely on new enabling technologies such as quantum computing to meet these requirements. A massive investment has been made in quantum technologies, particularly in the field of quantum computing. Notwithstanding, such developments of quantum computers threaten internet security, easily break down classical encryption and leak private information into malicious adversaries. Hence, quantum secure communication technologies and quantum encryption are the focus of investor interest. In particular, quantum key distribution (QKD) is said to be a secure communication technology that is apparent in the presence of the eavesdropper, Eve, who has unlimited power to break the encryption. Since the invention of the first QKD BB84 protocol in 1984, many researchers have participated in this field to achieve this exciting concept [3]. Several different works have been recently reported to remove attacks on real device defects from theoretical security proofs, such as reference [4]. Nevertheless, Yuen [5], [6] has discovered in theory that even real devices work perfectly along with the standardized theories, there are problems even in theory. Ali et al. [7] conducted both a theoretical investigation and an experimental implementation of weak decoy and vacuum states on ID-3000 commercial QKD system for increasing the performance of the system. The type of attack investigated was a photon number splitting (PNS) attack. Lo et al. [8] used Gottesman-Lo-LΓΌtkenhaus-Preskill (GLLP) method to prove the security of QKD based on a phase randomized weak coherent state source. The distance increased from 30 km with BB84 protocol to 140 km with decoy states protocol. To bridge the
  • 2.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 707-714 708 gap between theory and practice, decoy-state measurement-device-independent QKD (mdiQKD) has been proposed, [9]. Nevertheless, its experimental complexity is inappropriate for practical applications [10]-[12]. In addition, the key secret key is very weak with current technology [13], [14]. Also, measurement device independent quantum key distribution (MDI-QKD), allows removing any presumption of confidence from the measuring device, which can be said that the weakest part of QKD realizations [15]-[18]. Using single photon sources in QKD, a perfect secure key is obtained, i.e. eavesdropper would be detected. Utilizing sources of single photons eavesdropper can be detected by monitoring the receiver’s quantum bit error rate (QBER) [19]. when an eavesdropper, Eve, gets information, she changes the distribution of the key. This introducing errors in the correlations between the sender and receiver. Eve measurement modifies the state itself [20]. In the current technology, no single-photon devices are available; the best option in quantum key distribution system substitute’s single-photon source in QKD BB84 protocol by heavily attenuated laser pulses, these sources obey Poisson distribution, as shown in Figure 1 [17]. Poisson distribution for several values of mean photon number πœ‡ of Figure 1(a) 0.1, Figure 1(b) 1, Figure 1(c) 5, and Figure 1(d) 10. These sources have pulses traveling from sender to receiver contain more than one photon, opening the door for a weakness in system security [21]. Heavily attenuated laser pulses source output enables eavesdropper to share some information through a PNS attack. (a) (b) (c) (d) Figure 1. Poisson distribution for several values of mean photon number πœ‡ of (a) 0.1, (b) 1, (c) 5, and (d) 10 In this paper, the security of a QKD system has been enhanced by applying decoy states protocol against photon PNS. By randomly interleaving fake states (decoy states) with mean photon numbers of 5.38, 1.588, and 0.48 within the transmitted signal of 2.69, 0.794, and 0.24 mean photon numbers, a PNS has been detected and a secure key has been gotten. The signal states and decoy states were compared to check the efficiency of the system and detect the PNS attack. The average length for a secure key obtained from our system, which ignores eavesdropping cases, is 125 with 20% decoy states and 82 with 50% decoy states. The paper is organized as: sections 2 and section 3 give a brief description of the PNS attack strategy and main concepts of the decoy-state protocol. Sections 4 and section 5 detail the experimental work and results. Finally, the conclusion is given in section 6. 2. PHOTON NUMBER SPLITTING ATTACK PNS is a quite powerful attack described by LΓΌtkenhaus. By using attenuated laser pulses instead of the ideal single-photon as the source in BB84 QKD systems, the distribution of photons is as follows. The pulses with no photons decrease the signal rate since no signal will be detected by Bob. The pulses with single PNS is a quite powerful attack described by LΓΌtkenhaus. By using attenuated laser pulses instead of the ideal single-photon as the source in BB84 QKD systems, the distribution of photons is [22]: βˆ’ The pulses with single-photon work perfectly. βˆ’ The pulses with multi-photons are the problematic part. They have more than one copy of the polarization information, allowing Eve to split off a copy of the information without Alice and Bob knowing it.
  • 3. TELKOMNIKA Telecommun Comput El Control  Secure quantum key distribution system by applying decoy states protocol (Sura Adil Abbas) 709 βˆ’ The pulses with multi-photons are the problematic part. They have more than one copy of the polarization information, allowing Eve to split off a copy of the information without Alice and Bob knowing it. In the PNS attack, Eve knows the number of photons on each signal sent by Alice without disturbing its polarization by a quantum non-demolition measurement. Eve works on the signal depending on the total number of photons. More precisely, the existence of multi-photon signals permits Eve to execute the PNS attack. Photon work perfectly. βˆ’ When Eve finds empty pulses, she sends them back to Bob without further errors. βˆ’ When she finds the pulses with multi-photons, she steals one photon and retains it in her memory and sends the remainder to Bob. When Eve sends a reminder to Bob, the original lossy quantum channel may be replaced by a lossless channel. Eve’s does not change the signal polarization either in the photon she sends on nor in the photon she splits off. Subsequently, in the protocol Alice will announce the basis of the polarization of the signal. This will allow Eve to make the correct measurement on the photon she split off, thus getting perfect information about the polarization of Alice’s signal. βˆ’ When it is one photon, she just blocks it. 3. DECOY STATE PROTOCOL The protocol of decoy-state has been proposed for detecting PNS attack, improving transmission distance and rate of the generated secure key of the QKD system [7]. By applying the protocol of decoy-state, Alice implements a BB84 protocol with mean photon number of the signal source (πœ‡π‘ ) and replaces randomly with a mean photon number πœ‡π‘‘ (decoy-source). Eve cannot modify the transmission of the channel for more than one value of mean photon number (πœ‡) simultaneously. Eve treats single-photon signals from πœ‡π‘  or πœ‡π‘‘ identically because she does not know which one of πœ‡ is Alice used. Bob sends an acknowledgement of receipt of signals then Alice broadcasts pulses of signal states and pulses of decoy states. The rate of single-photon signals differ for each πœ‡, so Alice and Bob analyze separately the QBER of signal and decoy-state, since all characteristics of signal state and decoy-state are similar except πœ‡. The number of detection events from πœ‡π‘  and πœ‡π‘‘ transmissions will be compared to give an estimation bounds of the single-photon transmitted on the channel. PNS attack will be caught because of the modification in the QBER of the system or transmittance characteristics of decoy states and/or signal states. Decoy states are fake states used only for catching an eavesdropper, but not for a key generation [23]. In decoy protocol, let’s assume that heavily attenuated laser pulses source contains a single photon with a 90% probability, then multi-photons with a probability of 10% generated randomly, the problem is not known when the multi-photon pulses have been emitted. Let the channel loss (β„“) equal to 90%, then it has a 10% yield (𝑄). 𝑄 = 1 βˆ’ β„“ (1) By calculating the yield of decoy source, the eavesdropper can be detected. If attenuated laser pulses are used as a source in the QKD system, the fraction of multiphoton counts is called the fraction of tagged photons (βˆ†). It is a crucial value. Decoy-state protocol improved by Hwang [24] is an important method for the unconditional security of QKD with attenuated laser pulses to verify the upper bound of βˆ†. The verified upper bound of βˆ† in case of no eavesdropping is given by [25]. βˆ†= πœ‡π‘ π‘’βˆ’πœ‡π‘  πœ‡π‘‘π‘’βˆ’πœ‡π‘‘ (2) By neglecting the pulses which had no light (πœ‡0 = 0), βˆ† is given by: βˆ†β‰€ βˆ†π‘–= πœ‡π‘  πœ‡π‘‘βˆ’πœ‡π‘  ( πœ‡π‘  π‘’βˆ’πœ‡π‘  𝑄𝑑 πœ‡π‘‘ π‘’βˆ’πœ‡π‘‘ 𝑄𝑠 βˆ’ 1) (3) Where: βˆ†π‘– = minimum value of tagged photon for the PNS attack. 𝑄𝑠 = detection probability of signal pulses. 𝑄𝑠 = π‘›π‘œ. π‘œπ‘“ π‘ π‘–π‘”π‘›π‘Žπ‘™ π‘‘π‘’π‘‘π‘’π‘π‘‘π‘–π‘œπ‘›π‘  π‘›π‘œ. π‘œπ‘“ π‘ π‘–π‘”π‘›π‘Žπ‘™ π‘ π‘‘π‘Žπ‘‘π‘’π‘  𝑄𝑑 = detection probability of the decoy pulses. 𝑄𝑑 = π‘›π‘œ. π‘œπ‘“ π‘‘π‘’π‘π‘œπ‘¦ π‘‘π‘’π‘‘π‘’π‘π‘‘π‘–π‘œπ‘›π‘  π‘›π‘œ. π‘œπ‘“ π‘‘π‘’π‘π‘œπ‘¦ π‘ π‘‘π‘Žπ‘‘π‘’π‘  The flowchart shown in Figure 2 represents decoy state protocol.
  • 4.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 707-714 710 Figure 2. Block diagram of the BB84 protocol with decoy-state 4. EXPERIMENTAL WORK AND RESULTS Figure 3 and Figure 4 show block diagram and experimental set up of our implemented QKD system based on the BB84 protocol. The transmitter side of the system has four laser diodes that are connected to personal computer (PC) through driver circuits. Trigger signals generated by PC, shown in Figure 5(a), fed driver circuits to generate an electrical signal that is used to operate each laser diode. Signal-states are emitted by running one laser diode randomly during one loop of program execution. The value of πœ‡ in the system was controlled by reducing the intensity of the optical signal emitted from each laser diodes by using optical filters shown in Figure 5(b). Decoy-states (fake states) are produced by deriving two laser diodes concurrently, as shown in Figure 6. Decoy-states are interleaved randomly between the signal states within the four laser diodes operating loop of the system. The pulse duration for the electrical signal that is used to operate laser diodes was 200 ns at 11 kHz. The system was running with the BB84 protocol with and without decoy states. The numbers of total random bit generated from PC was equal to 𝑁 = 30000. A comparison between these two cases was accomplished in order to detect a PNS attack. A program is written in MATLAB R2015a in order to analyze the results of the comparison. In this system, eavesdropping is checked for two types of decoy-states, 1-state decoy, i.e. (20%), and 4-states, i.e. (50%). For each type, two laser diodes were operated simultaneously. The beam splitter (PNS) was applied for all measurements. In the receiver side, for single-photon avalanche photodiode (APD) operating in Geiger mode, two excess voltage were used (𝑉𝐸 = 5 V and 𝑉𝐸 = 7 V) at temperature -11 o C. Figure 7 shows the tests carried out for APD counts when one laser diode (LD) on (signal-states) Figure 7(a) and two LDs on (decoy-states) Figure 7(b). BB84 protocol including privacy amplification stages and error correction was applied to obtain the final key. Keys were extracted for QBER less than 15%. The tests are listed in the diagram shown in Figure 8.
  • 5. TELKOMNIKA Telecommun Comput El Control  Secure quantum key distribution system by applying decoy states protocol (Sura Adil Abbas) 711 Figure 3. Quantum key distribution system for the BB84 protocol LD: laser diode, BS: beam splitter, PBS: polarizing beam splitter, APD: avalanche photodiode, πœ†/2: half-wave plate, and PC: personal computer. Figure 4. The setup of quantum cryptography system in the lab Figure 5. PC signals and triggering signals for LD1: (a) PC signals and (b) firing pulse Figure 6. Decoy states pulses
  • 6.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 707-714 712 (a) (b) Figure 7. Number of counts as a response for: (a) one LD on (signal states) and (b) two LDs on (decoy states) Figure 8. Measurements and calculations block diagram Tables 1 and Table 2 show the average values of final key length with PNS attack for two voltage values 𝑉𝐸 = 5 V, 7 V and without PNS attack for 𝑉𝐸 = 5 V,7 V and for (πœ‡π‘  = 0.24) by applying high attenuation on the transmitted signal and (πœ‡π‘  = 0.794) with less attenuation respectively. The results give for 20% and 50% decoy states.for high attenuation (πœ‡π‘  = 0.24) the un appropriate to the system, while by using (πœ‡π‘  = 0.794) secure keys have been obtained.
  • 7. TELKOMNIKA Telecommun Comput El Control  Secure quantum key distribution system by applying decoy states protocol (Sura Adil Abbas) 713 Table 1. Average values of the final key lengths with and without PNS attack for 𝑉𝐸 = 5 V, 7 V and πœ‡π‘  = 0.24 𝑉𝐸/V Average final un attacked key length Average final attacked key length 20% decoy states 50% decoy states 20% decoy states 50% decoy states 5 83 65 76 46 7 96 55 77 47 Table 2. Average values of the final key lengths with and without PNS attack for 𝑉𝐸 = 5 V, 7 V and πœ‡π‘ = 0.794 𝑉𝐸/V Average final un attacked key length Average final attacked key length 20% decoy states 50% decoy states 20% decoy states 50% decoy states 5 125 82 104 64 7 140 80 132 63 5. CONCLUSIONS From our work the maximum average secure key length obtained was equal to 125 with 20 % decoy states and 82 with 50% decoy states which is considered to be short with maximum key length of 388 which was obtained from the same system by applying the BB84 protocol without decoy states. But the security of key is not guaranteed as far as the presence of Eve was not tested. The results obtained with, APD temperature = -11 ΒΊC and distance = 85 cm, the best values of πœ‡ to give secure key with QBER < 15% satisfying βˆ†< βˆ†π‘– is (πœ‡π‘  = 0.794) for both cases of using 20% and 50% decoy states with BB84 protocol with 𝑉𝐸 = 5 V. REFERENCES [1] N. A. Al-Shareefi, S. A. Abbas, M. S. Alkhazraji, and A. A. R. Sakran, "Towards secure smart cities: design and implementation of smart home digital communication system," Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 21, no. 1, pp. 271–277, Jan. 2021, doi: 10.11591/ijeecs.v21.i1.pp271-277. [2] N. A. Al-Shareefi, J. Aldhaibaini, S. Abbas, and H. Obaid, "Comparison of Three Different EOU Techniques for Fifth-Generation MM-W Wireless Networks," Iraqi Journal for Computers and Informatics, vol. 45, no. 2, pp. 9-14, 2019, doi: 10.25195/ijci.v45i2.47. [3] T. Iwakoshi, "On problems in security of quantum key distribution raised by Yuen," Proceedings Quantum Information Science and Technology III, 2017, vol. 10442, doi: 10.1117/12.2278625. [4] K. Tamaki, M. Curty, and M. Lucamarini, "Decoy-state quantum key distribution with a leaky source," New Journal of Physics, vol. 18, pp. 1-24, 2016, doi: 10.1088/1367-2630/18/6/065008. [5] H. P. Yuen, "Fundamental quantitative security in quantum key generation," Physical Review A, vol. 82, 2010, doi: 10.1103/PhysRevA.82.062304. [6] H. P. Yuen, "Universality and The Criterion d in Quantum Key Generation," arXiv, 2009. [Online]. Available: https://arxiv.org/abs/0907.4694 [7] S. Ali, S. Saharudin, and M. R. B. Wahiddin, "Quantum key distribution using decoy state protocol," American Journal of Engineering and Applied Sciences, vol. 2, no. 4, pp. 694-698, 2009. [Online]. Available: https://thescipub.com/pdf/ajeassp.2009.694.698.pdf [8] H. -K. Lo, X. Ma, and K. Chen, "Decoy state quantum key distribution," Physical review letters, vol. 94, 2005, doi: 10.1103/PhysRevLett.94.230504. [9] H. -K. Lo, M. Curty, and B. Qi, "Measurement-device-independent quantum key distribution," Physical review letters, vol. 108, 2012, doi: 10.1103/PhysRevLett.108.130503. [10] B. Hensen et al., "Loophole-free Bell inequality violation using electron spins separated by 1.3 kilometres," Nature, vol. 526, pp. 682-686, 2015, doi: 10.1038/nature15759. [11] M. Giustina et al., "Significant-loophole-free test of Bell’s theorem with entangled photons," Physical review letters, vol. 115, 2015, doi: 10.1103/PhysRevLett.115.250401. [12] L. K. Shalm et al., "Strong Loophole-Free Test of Local Realism," Physical review letters, vol. 115, 2016, doi: 10.1103/PhysRevLett.115.250402. [13] N. Gisin, S. Pironio, and N. Sangouard, "Proposal for implementing device-independent quantum key distribution based on a heralded qubit amplifier," Physical review letters, vol. 105, 2010, doi: 10.1103/PhysRevLett.105.070501. [14] M. Curty and T. Moroder, "Heralded-qubit amplifiers for practical device-independent quantum key distribution," Physical Review A, vol. 84, 2011, doi: 10.1103/PhysRevA.84.010304. [15] N. A. Al-Shareefi, J. A. Aldhaibaini, S. A. Abbas, and H. S. Obaid, "Towards 5G millimeter-wave wireless networks: a comparative study on electro-optical upconversion techniques," vol. 20, no. 3, pp. 1471-1478, Dec. 2020, doi: 10.11591/ijeecs.v20.i3.pp1471-1478. [16] Y. Zhao, C. -H. F. Fung, B. Qi, C. Chen, and H. -K. Lo, "Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems," Physical Review A, vol. 78, 2008, doi: 10.1103/PhysRevA.78.042333. [17] N. A. Al-Shareefi, S. I. S. Hassan, F. Malek, R. Ngah, and S. A. Abbas, "Optical Generation of 60 GHz Downstream Data in Radio over Fiber Systems Based on Two Parallel Dual-Drive MZMs," International Journal of Engineering and Technology (IJET), vol. 6, no. 2, pp. 579-587, 2014. [Online]. Available: https://www.enggjournals.com/ijet/docs/IJET14-06-02-026.pdf [18] N. A. Al-Shareefi and A. A. Sakran, "A novel optimal small cells deployment for next-generation cellular networks," International Journal of Electrical and Computer Engineering (IJECE), vol. 11, no. 6, pp. 5259-5265, 2021, doi: 10.11591/ijece.v11i6.pp5259-5265. [19] A. Gaidash, V. I. Egorov, and A. V. Gleim, "Revealing of photon-number splitting attack on quantum key distribution system by photon-number resolving devices," Journal of Physics: Conference Series, 2016, vol. 735, doi: 10.1088/1742-6596/735/1/012072. [20] J. Hasegawa, M. Hayashi, T. Hiroshima, and A. Tomita, "Security analysis of decoy state quantum key distribution incorporating finite statistics," arXiv, 2007. [Online]. Available: https://arxiv.org/abs/0707.3541
  • 8.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 20, No. 4, August 2022: 707-714 714 [21] A. Niederberger, V. Scarani, and N. Gisin, "Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography," Physical Review A, vol. 71, 2005, doi: 10.1103/PhysRevA.71.042316. [22] X. Ma, "Quantum cryptography: from theory to practice," arXiv, 2007. [Online]. Available: https://arxiv.org/pdf/0808.1385.pdf [23] D. Rosenberg et al., "Long-distance decoy-state quantum key distribution in optical fiber," Physical review letters, vol. 98, 2007, doi: 10.1103/PhysRevLett.98.010503. [24] W. -Y. Hwang, "Quantum key distribution with high loss: toward global secure communication," Physical Review Letters, vol. 91, 2003, doi: 10.1103/PhysRevLett.91.057901. [25] X.-B. Wang, "Decoy-state protocol for quantum cryptography with four different intensities of coherent light," Physical Review A, vol. 72, 2005, doi: 10.1103/PhysRevA.72.012322. BIOGRAPHIES OF AUTHORS Sura Adil Abbas received the Bachelor of electronic and communication engineering from University of Baghdad /collage of engineering /department of electronic and communication engineering / Iraq / Baghdad/ Aljaderiyah, in 2005. The Masters. Degree in electronic and communication engineering from University of Baghdad/institute of laser for postgraduate studies / Iraq / Baghdad / Aljaderiyah, in 2011. She is currently working as an assistant teacher at Department of Communication and Mobile Computing Engineering, faculty of Engineering, University of Information Technology and Communications (UOITC), Baghdad, Iraq. She can be contacted at email: sura.adel@uoitc.edu.iq. Nael A. Al-Shareefi received the B.Sc. degree in electronic and communications engineering and the M.Sc. degree in communications engineering from the University of Technology, Baghdad, Iraq, in 1999 and 2001, respectively, and the Ph.D. degree in communications engineering from Universiti Malaysia Perlis (UniMAP), Malaysia, in 2014. Since 2019, he has been working as the Head of the Intelligent Medical Systems Department, College of Biomedical Informatics, University of Information Technology and Communications (UOITC), Baghdad. His research interests include 60-GHz millimeter-wave generation, radio-over-fiber, optical fiber communications, and fifth generation of mobile networks. He received an Associate Professorship at University of Information Technology and Communications (UOITC), Baghdad, in 2020. He can be contacted at email: dr.nael.al_shareefi@uoitc.edu.iq.