Development of superposition-based quantum key distribution protocol in decentralized full mesh networks

Authors

DOI:

https://doi.org/10.15587/1729-4061.2024.318588

Keywords:

quantum cryptography, quantum key distribution, quantum mechanics, qubit, decentralized protocols

Abstract

The object of this research is the security of communication networks, particularly in decentralized, multi-user environments where robust data protection and integrity are critical. The issue under discussion is the rising vulnerability of conventional cryptography systems resulting from ever complex cyberattacks and the expected risks presented by quantum computing possibilities. The development of a QKD protocol employing quantum superposition to improve data security and resilience against both present and future quantum-based cyber-attacks is demonstrated by the achieved results of this work. Achieving scalability and autonomous eavesdropping detection, this protocol lets several communication nodes securely exchange randomly produced keys without centralized management. A quick analysis of the results reveals that main elements influencing the great durability, security, and adaptability of the protocol are quantum superposition and its distributed character. Without centralized authority, the characteristics of the obtained results – especially the use of optical components, detectors, and quantum sources in conjunction with classical communication channels – solve the problem of ensuring data confidentiality and integrity in a multi-user environment. This protocol's practical reach covers safe communication applications in both public and private sectors, therefore addressing situations calling for strong data protection against modern cyberattacks. Conditions for practical application include settings like government, financial, or health-related interactions when safe information flow is crucial. This QKD system offers a future-ready security solution for high-stakes environments and represents notable advancement toward protecting data from quantum and conventional attacks

Author Biographies

Yenlik Begimbayeva, Satbayev University; Institute of Information and Computational Technologies

PhD, Senior Researcher

Olga Ussatova, Satbayev University; Institute of Information and Computational Technologies

PhD, Senior Researcher

Temirlan Zhaxalykov, Satbayev University; Kazakh-British Technical University

Master of Technical Sciences, Scientific Researcher

Amir Akhtanov, Satbayev University; Kazakh-British Technical University

Engineer

Student

School of Information Technology and Engineering

Ruslan Pashkevich, Satbayev University; Kazakh-British Technical University

Engineer

Student

School of Information Technology and Engineering

Mukaddas Arshidinova, Satbayev University

PhD, Scientific Researcher

References

  1. Global Data Breaches and Cyber Attacks in 2024 (2024). IT Governance. Available at: https://www.itgovernance.co.uk/blog/global-data-breaches-and-cyber-attacks-in-2024
  2. Data generated per day, 2024. Exploding Topics. Available at: https://explodingtopics.com/
  3. Rivest, R. L., Shamir, A., Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21 (2), 120–126. https://doi.org/10.1145/359340.359342
  4. Shor, P. W. (1994). Algorithms for quantum computation: discrete logarithms and factoring. Proceedings 35th Annual Symposium on Foundations of Computer Science, 124–134. https://doi.org/10.1109/sfcs.1994.365700
  5. Algazy, K., Sakan, K., Khompysh, A., Dyusenbayev, D. (2024). Development of a New Post-Quantum Digital Signature Algorithm: Syrga-1. Computers, 13 (1), 26. https://doi.org/10.3390/computers13010026
  6. Wiesner, S. (1983). Conjugate coding. ACM SIGACT News, 15 (1), 78–88. https://doi.org/10.1145/1008908.1008920
  7. Brassard, G. (2005). Brief history of quantum cryptography: a personal perspective. IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005., 19–23. https://doi.org/10.1109/itwtpi.2005.1543949
  8. Bennett, C. H., Brassard, G. (1984). An Update on Quantum Cryptography. Advances in Cryptology, 475–480. https://doi.org/10.1007/3-540-39568-7_39
  9. Ekert, A. K. (1991). Quantum cryptography based on Bell’s theorem. Physical Review Letters, 67 (6), 661–663. https://doi.org/10.1103/physrevlett.67.661
  10. Bennett, C. H., Brassard, G. (2014). Quantum cryptography: Public key distribution and coin tossing. Theoretical Computer Science, 560, 7–11. https://doi.org/10.1016/j.tcs.2014.05.025
  11. Muller, A., Herzog, T., Huttner, B., Tittel, W., Zbinden, H., Gisin, N. (1997). “Plug and play” systems for quantum cryptography. Applied Physics Letters, 70 (7), 793–795. https://doi.org/10.1063/1.118224
  12. Wang, J., Qin, X., Jiang, Y., Wang, X., Chen, L., Zhao, F. et al. (2016). Experimental demonstration of polarization encoding quantum key distribution system based on intrinsically stable polarization-modulated units. Optics Express, 24 (8), 8302. https://doi.org/10.1364/oe.24.008302
  13. Mo, X.-F., Zhu, B., Han, Z.-F., Gui, Y.-Z., Guo, G.-C. (2005). Faraday-Michelson system for quantum cryptography. Optics Letters, 30 (19), 2632. https://doi.org/10.1364/ol.30.002632
  14. Zhang, C.-H., Zhou, X.-Y., Ding, H.-J., Zhang, C.-M., Guo, G.-C., Wang, Q. (2018). Proof-of-Principle Demonstration of Passive Decoy-State Quantum Digital Signatures Over 200 km. Physical Review Applied, 10 (3). https://doi.org/10.1103/physrevapplied.10.034033
  15. Matsumoto, R. (2007). Multiparty quantum-key-distribution protocol without use of entanglement. Physical Review A, 76 (6). https://doi.org/10.1103/physreva.76.062316
  16. Razavi, M. (2012). Multiple-Access Quantum Key Distribution Networks. IEEE Transactions on Communications, 60 (10), 3071–3079. https://doi.org/10.1109/tcomm.2012.072612.110840
  17. Epping, M., Kampermann, H., Macchiavello, C., Bruß, D. (2017). Multi-partite entanglement can speed up quantum key distribution in networks. New Journal of Physics, 19 (9), 093012. https://doi.org/10.1088/1367-2630/aa8487
  18. Yu, K.-F., Gu, J., Hwang, T., Gope, P. (2017). Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing. Quantum Information Processing, 16 (8). https://doi.org/10.1007/s11128-017-1631-x
  19. Pivoluska, M., Huber, M., Malik, M. (2018). Layered quantum key distribution. Physical Review A, 97 (3). https://doi.org/10.1103/physreva.97.032312
  20. Li, L., Li, Z. (2019). A multi-party quantum key distribution protocol based on phase shift operation. Laser Physics, 29 (10), 105201. https://doi.org/10.1088/1555-6611/ab3845
  21. Li, L., Li, Z. (2020). A verifiable multiparty quantum key agreement based on bivariate polynomial. Information Sciences, 521, 343–349. https://doi.org/10.1016/j.ins.2020.02.057
  22. Ma, X., Wang, C., Li, Z., Zhu, H. (2021). Multi-Party Quantum Key Distribution Protocol with New Bell States Encoding Mode. International Journal of Theoretical Physics, 60 (4), 1328–1338. https://doi.org/10.1007/s10773-021-04758-4
  23. Shan, R.-T., Chen, X., Yuan, K.-G. (2021). Multi-party blind quantum computation protocol with mutual authentication in network. Science China Information Sciences, 64 (6). https://doi.org/10.1007/s11432-020-2977-x
  24. Doosti, M., Hanouz, L., Marin, A., Kashefi, E., Kaplan, M. (2024). Establishing Shared Secret Keys on Quantum Line Networks: Protocol and Security. 2024 International Conference on Quantum Communications, Networking, and Computing (QCNC), 176–183. https://doi.org/10.1109/qcnc62729.2024.00035
  25. Begimbayeva, Y., Zhaxalykov, T., Makarov, M., Ussatova, O., Tynymbayev, S., Temirbekova, Zh. (2024). Development of a Hybrid Quantum Key Distribution Concept for Multi-User Networks. International Journal of Advanced Computer Science and Applications, 15 (9). https://doi.org/10.14569/ijacsa.2024.0150940
  26. Yevseiev, S., Pohasii, S., Milevskyi, S., Milov, O., Melenti, Y., Grod, I. et al. (2021). Development of a method for assessing the security of cyber-physical systems based on the Lotka-Volterra model. Eastern-European Journal of Enterprise Technologies, 5 (9 (113)), 30–47. https://doi.org/10.15587/1729-4061.2021.241638
  27. Yevseiev, S., Havrylova, A., Milevskyi, S., Sinitsyn, I., Chalapko, V., Dukin, H. et al. (2023). Development of an improved SSL/TLS protocol using post-quantum algorithms. Eastern-European Journal of Enterprise Technologies, 3 (9 (123)), 33–48. https://doi.org/10.15587/1729-4061.2023.281795
  28. Rasool, A. A., Abbas, N. M., Sheikhyounis, K. (2022). Determination of optimal size and location of static synchronous compensator for power system bus voltage improvement and loss reduction using whale optimization algorithm. Eastern-European Journal of Enterprise Technologies, 1 (8 (115)), 26–34. https://doi.org/10.15587/1729-4061.2022.251760
Development of superposition-based quantum key distribution protocol in decentralized full mesh networks

Downloads

Published

2024-12-27

How to Cite

Begimbayeva, Y., Ussatova, O., Zhaxalykov, T., Akhtanov, A., Pashkevich, R., & Arshidinova, M. (2024). Development of superposition-based quantum key distribution protocol in decentralized full mesh networks. Eastern-European Journal of Enterprise Technologies, 6(9 (132), 39–46. https://doi.org/10.15587/1729-4061.2024.318588

Issue

Section

Information and controlling system