Ternary Two Wavelength Quantum Key Distribution Protocol With Physical Unclonable Function Error Models and Eavesdropper Detection

Brit Riggs, Dina Ghanai Miandoab, Bertrand Cambou

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper presents and studies the expected bit error rate (BER) of a prepare-and-measure quantum key distribution (QKD) protocol utilizing two wavelengths, ternary data, and a physical unclonable function (PUF). Models are developed as a function of channel and PUF noise, with and without eavesdropping, and then are subsequently validated through software simulations. At channel error rates below 30% and PUF error rates up to 10%, an eavesdropper presents a detectable error rate without Alice and Bob having to reveal a sample of their key.

Original languageEnglish (US)
Title of host publicationProceedings - 2024 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, CyberC 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages175-181
Number of pages7
ISBN (Electronic)9798331506896
DOIs
StatePublished - 2024
Event16th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, CyberC 2024 - Guangzhou, China
Duration: Oct 24 2024Oct 26 2024

Publication series

NameProceedings - 2024 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, CyberC 2024

Conference

Conference16th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover, CyberC 2024
Country/TerritoryChina
CityGuangzhou
Period10/24/2410/26/24

Keywords

  • eavesdropper attacks
  • multi-wavelength
  • physical unclonable function
  • quantum key distribution

ASJC Scopus subject areas

  • Information Systems and Management
  • Safety, Risk, Reliability and Quality
  • Artificial Intelligence
  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems

Fingerprint

Dive into the research topics of 'Ternary Two Wavelength Quantum Key Distribution Protocol With Physical Unclonable Function Error Models and Eavesdropper Detection'. Together they form a unique fingerprint.

Cite this