A Novel Approach Based on Quantum Key Distribution Using BB84 and E91 Protocol for Resilient Encryption and Eavesdropper Detection

Journal article


U.A, N., Waqar, M., Bilal, Anas., Kim, Ajung., Ali, H., Tariq, M. and Nadeem, M. 2025. A Novel Approach Based on Quantum Key Distribution Using BB84 and E91 Protocol for Resilient Encryption and Eavesdropper Detection. IEEE Access. 13, pp. 32819-32833. https://doi.org/10.1109/ACCESS.2025.3539178
AuthorsU.A, N., Waqar, M., Bilal, Anas., Kim, Ajung., Ali, H., Tariq, M. and Nadeem, M.
Abstract

Quantum cryptography is anticipated to drive substantial advancements in the field of cybersecurity. The impending arrival of quantum cryptography has the potential to compromise current encryption methods, thereby possibly compromising the effectiveness of traditional key management-based security protocols. Quantum cryptography represents a burgeoning area that necessitates thorough examination and scrutiny to validate its efficacy in safeguarding data and securely distributing secret keys. One fundamental quantum key distribution protocol, BB84, encounters challenges when operating with fewer quantum bits (qubits) and bases that only support up to 8 qubits. This limitation weakens the system’s security, making brute force, intercept, and resend attacks less challenging. Consequently, this study proposes a method to enhance the security of the BB84 protocol, to reduce susceptibility to attacks and eavesdropping. The proposed improved BB84 protocol utilizes 9, 12, and 16 quantum bits along with two, and three bases to significantly bolster security, allowing authorized parties to prevent the key distribution process and eliminate the use of compromised keys. Additionally, this study has implemented the E91 quantum key distribution protocol utilizing the Entanglement Pair Generation method to produce secure keys. While the existing E91 protocol ensures security through Bell’s theorem and Bell’s inequality, it overlooks the impact of noise, leading to inaccuracies in eavesdropper detection. Hence, this study introduces an additional security measure. Whenever an eavesdropper attempts to measure the quantum state, the proposed E91 protocol collapses its state from |10⟩ to |11⟩, setting the first qubit to |1⟩ and the other qubit to |0⟩, thus providing the eavesdropper with incorrect information, accompanied by a phase angle of 15π/8. This leads to misconception and misconfiguration, preventing eavesdroppers from obtaining useful details about transferred quantum states and compromising the keys. Additionally, considering that the proposed E91 protocol relies on entangled particles and utilizes double qubit gates, which are inherently noisier than single qubit gates and susceptible to quantum decoherence, this study employs error mitigation techniques in the final measurement to predict outcomes more efficiently.

KeywordsQuantum Cryptography; Quantum Key Distribution; Eavesdropper Detection; Quantum Entanglement
Year2025
JournalIEEE Access
Journal citation13, pp. 32819-32833
PublisherIEEE Xplore
ISSN2169-3536
Digital Object Identifier (DOI)https://doi.org/10.1109/ACCESS.2025.3539178
Web address (URL)https://ieeexplore.ieee.org/document/10872935/authors#authors
Publisher's version
License
File Access Level
Open
Output statusPublished
Publication dates
Online05 Feb 2025
Publication process dates
Accepted07 Feb 2025
Deposited06 Mar 2025
Permalink -

https://repository.derby.ac.uk/item/qw9q3/a-novel-approach-based-on-quantum-key-distribution-using-bb84-and-e91-protocol-for-resilient-encryption-and-eavesdropper-detection

  • 5
    total views
  • 1
    total downloads
  • 5
    views this month
  • 1
    downloads this month

Export as

Related outputs

Behind the Code: Identifying Zero-Day Exploits in WordPress
Mohamed Mohideen, M.A., Nadeem, M.S., Hardy, J., Ali, H., Tariq, U.U., Sabrina, F., Waqar, M. and Ahmed, S. 2024. Behind the Code: Identifying Zero-Day Exploits in WordPress. Future Internet. 16 (7), pp. 1-22. https://doi.org/10.3390/fi16070256
Energy-aware Successor Tree Consistent EDF Scheduling for PCTGs on MPSoCs
Tariq, UU., Ali, H., Nadeem, M.S., Jan, S.R., Sabrina, F., Grandhi, S., Wang, Z. and Liu, L. 2024. Energy-aware Successor Tree Consistent EDF Scheduling for PCTGs on MPSoCs. IEEE Access. 4, pp. 1-21. https://doi.org/10.1109/ACCESS.2024.3403418
Two-Level Dynamic Programming-Enabled Non-Metric Data Aggregation Technique for the Internet of Things
Jan, S.R., Ghaleb, B., Tariq, U.U., Ali, H., Sabrina, F. and Liu, L. 2024. Two-Level Dynamic Programming-Enabled Non-Metric Data Aggregation Technique for the Internet of Things. Electronics. 13 (9), pp. 1-17. https://doi.org/10.3390/electronics13091651
Violence Analysis Through Deep Learning: An Approach using Virtual Environments
Nadeem, M. 2023. Violence Analysis Through Deep Learning: An Approach using Virtual Environments. Thesis https://doi.org/10.48773/q3290
Deep labeller: automatic bounding box generation for synthetic violence detection datasets
Nadeem, M., Kurugollu, F., Saravi, S., Atlam, H. and Franqueira, V. 2023. Deep labeller: automatic bounding box generation for synthetic violence detection datasets. Multimedia Tools and Applications. pp. 1-18. https://doi.org/10.1007/s11042-023-15621-5
Energy-aware scheduling of streaming applications on edge-devices in IoT based healthcare
Tariq, Umair Ullah, Ali, Haider, Liu, Lu, Hardy, J., Kazim, M. and Ahmed, Waqar 2021. Energy-aware scheduling of streaming applications on edge-devices in IoT based healthcare. IEEE Transactions on Green Communications and Networking. https://doi.org/10.1109/tgcn.2021.3056479