Affiliation:
1. Department of Physics Indian Institute of Technology Jodhpur Jodhpur Rajasthan 342030 India
2. Department of Physics and Materials Science & Engineering Jaypee Institute of Information Technology A 10, Sector 62 Noida UP‐201309 India
Abstract
AbstractA systematic analysis of the advantages and challenges associated with the satellite‐based implementation of the high dimensional extended B92 (HD‐Ext‐B92) and high‐dimensional BB84 (HD‐BB84) protocol is analyzed. The method used earlier for obtaining the key rate for the HD‐Ext‐B92 is modified here and subsequently the variations of the key rate, probability distribution of key rate (PDR), and quantum bit error rate (QBER) with respect to dimension and noise parameter of a depolarizing channel is studied using the modified key rate equation. Further, the variations of average key rate (per pulse) with zenith angle and link length in different weather conditions in day and night considering extremely low noise for dimension are investigated using elliptic beam approximation. The effectiveness of the HD‐(extended) protocols used here in creating satellite‐based quantum key distribution links (both up‐link and down‐link) are established by appropriately modeling the atmosphere and analyzing the variation of average key rates with the probability distribution of the transmittance (PDT). The analysis performed here has revealed that in higher dimensions, HD‐BB84 outperforms HD‐Ext‐B92 in terms of both key rate and noise tolerance. However, HD‐BB84 experiences a more pronounced saturation of QBER in high dimensions.
Funder
Indian Space Research Organisation
Reference195 articles.
1. R. L.Rivest A.Shamir L. M.Adleman U.S. Patent No. 4 405 829. Washington DC: U.S. Patent and Trademark Office 1983.
2. Secure quantum key distribution with realistic devices
3. C. H.Bennett G.Brassard Quantum cryptography: Public‐key distribution and coin tossing inProc. IEEE Int. Conf. on Computers Systems and Signal Processing (Bangalore India 1984) IEEE Piscataway1984 pp.175–179.
4. Quantum cryptography based on Bell’s theorem
5. Quantum cryptography using any two nonorthogonal states