Performance Analysis of Different Quantum Key Distribution Protocols for Optimised Security and Efficiency

IF 2.8 Q3 QUANTUM SCIENCE & TECHNOLOGY
Prakash Dhakal, Babu R. Dawadi, Nanda Bikram Adhikari
{"title":"Performance Analysis of Different Quantum Key Distribution Protocols for Optimised Security and Efficiency","authors":"Prakash Dhakal,&nbsp;Babu R. Dawadi,&nbsp;Nanda Bikram Adhikari","doi":"10.1049/qtc2.70015","DOIUrl":null,"url":null,"abstract":"<p>Quantum key distribution (QKD) protocols are techniques that use the laws of quantum physics to safely distribute cryptographic keys. QKD protocols are able to identify attempts at eavesdropping during the distribution of keys, possibly providing a better level of security than traditional encryption. We present a comparative evaluation of the three QKD protocols, namely, BB84, E91 and an enhanced BB84 (EBB84) with the goal of identifying the best balance between security and efficiency for practical quantum communication systems. Motivated by the growing need for quantum-resistant cryptography, extensive simulations in the Qiskit framework under both ideal and plausible noisy conditions is conducted, including depolarising, thermal relaxation, Pauli, amplitude damping and phase damping noise models. For each protocol, key lengths are varied from 200 to 3000 bits and, where relevant, simulated intercept–resend attacks to assess resilience against eavesdropping. The key performance metrics, QBER for BB84/EBB84 and the CHSH inequality parameter for E91 are computed over 50 iterations per scenario to ensure statistical robustness. The analysis reveals distinct trade-offs: EBB84 achieves superior early eavesdropper detection at short key lengths, whereas differences between BB84 and EBB84 diminishes as key lengths increases; E91 maintains strong entanglement-based security but is more sensitive to certain noise types. Regression analysis confirms that depolarising and amplitude damping noise most strongly influence QBER and CHSH degradation, whereas key length has a secondary effect. These findings mark the importance of adaptive key management and noise mitigation strategies and offer guidelines for integrating QKD into emerging network architectures such as SDN, 5G, and 6G.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"6 1","pages":""},"PeriodicalIF":2.8000,"publicationDate":"2025-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.70015","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Quantum Communication","FirstCategoryId":"1085","ListUrlMain":"https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/qtc2.70015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"QUANTUM SCIENCE & TECHNOLOGY","Score":null,"Total":0}
引用次数: 0

Abstract

Quantum key distribution (QKD) protocols are techniques that use the laws of quantum physics to safely distribute cryptographic keys. QKD protocols are able to identify attempts at eavesdropping during the distribution of keys, possibly providing a better level of security than traditional encryption. We present a comparative evaluation of the three QKD protocols, namely, BB84, E91 and an enhanced BB84 (EBB84) with the goal of identifying the best balance between security and efficiency for practical quantum communication systems. Motivated by the growing need for quantum-resistant cryptography, extensive simulations in the Qiskit framework under both ideal and plausible noisy conditions is conducted, including depolarising, thermal relaxation, Pauli, amplitude damping and phase damping noise models. For each protocol, key lengths are varied from 200 to 3000 bits and, where relevant, simulated intercept–resend attacks to assess resilience against eavesdropping. The key performance metrics, QBER for BB84/EBB84 and the CHSH inequality parameter for E91 are computed over 50 iterations per scenario to ensure statistical robustness. The analysis reveals distinct trade-offs: EBB84 achieves superior early eavesdropper detection at short key lengths, whereas differences between BB84 and EBB84 diminishes as key lengths increases; E91 maintains strong entanglement-based security but is more sensitive to certain noise types. Regression analysis confirms that depolarising and amplitude damping noise most strongly influence QBER and CHSH degradation, whereas key length has a secondary effect. These findings mark the importance of adaptive key management and noise mitigation strategies and offer guidelines for integrating QKD into emerging network architectures such as SDN, 5G, and 6G.

Abstract Image

Abstract Image

Abstract Image

基于优化安全性和效率的不同量子密钥分发协议的性能分析
量子密钥分发(QKD)协议是使用量子物理定律来安全分发加密密钥的技术。QKD协议能够在密钥分发过程中识别窃听企图,可能提供比传统加密更好的安全级别。我们提出了三种QKD协议的比较评估,即BB84, E91和增强型BB84 (EBB84),目的是确定实际量子通信系统的安全性和效率之间的最佳平衡。由于对抗量子密码学日益增长的需求,在Qiskit框架下,在理想和合理的噪声条件下进行了广泛的模拟,包括去极化、热松弛、泡利、振幅阻尼和相位阻尼噪声模型。对于每个协议,密钥长度从200到3000位不等,并且在相关的情况下,模拟拦截-重发攻击以评估对窃听的恢复能力。关键性能指标、BB84/EBB84的QBER和E91的CHSH不等式参数在每个场景的50次迭代中计算,以确保统计稳健性。分析揭示了明显的权衡:EBB84在短密钥长度下实现了优越的早期窃听检测,而BB84和EBB84之间的差异随着密钥长度的增加而减小;E91保持强大的基于纠缠的安全性,但对某些类型的噪声更敏感。回归分析证实,去极化和振幅阻尼噪声对QBER和CHSH退化的影响最大,而密钥长度的影响次之。这些发现表明了自适应密钥管理和噪声缓解策略的重要性,并为将QKD集成到SDN、5G和6G等新兴网络架构中提供了指导。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
6.70
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信