Raiyan Rahman, Md Shawmoon Azad, Mohammed Rakibul Hasan, Syed Emad Uddin Shubha, M. R. C. Mahdy
{"title":"量子安全图像传输:利用纠缠的混沌辅助量子密钥分发方法","authors":"Raiyan Rahman, Md Shawmoon Azad, Mohammed Rakibul Hasan, Syed Emad Uddin Shubha, M. R. C. Mahdy","doi":"10.1049/qtc2.70016","DOIUrl":null,"url":null,"abstract":"<p>The emergence of quantum computing has introduced unprecedented security challenges to conventional cryptographic systems, particularly in the domain of classical communications. Our research addresses these challenges by creatively combining quantum key distribution (QKD), specifically the E91 protocol, with logistic chaotic maps to establish a secure image transmission scheme. Our approach utilises the pseudo-randomness of chaotic systems alongside the security mechanisms inherent in quantum entanglement-based protocols. This framework leverages the E91 protocol for secure quantum key distribution to generate identical key pairs at both ends, followed by chaos encryption using the key as a basis for the parameters. This framework utilises the E91 protocol for secure quantum key distribution, leveraging maximally entangled pairs and CHSH inequality tests to detect eavesdropping and potential double-agent attacks by identifying nonentangled qubits, therefore maintaining key confidentiality. Furthermore, through quantitative simulations, we demonstrate the effectiveness of this scheme through key space and key sensitivity analysis, histogram analysis, information entropy analysis, execution time analysis, and differential attack analysis in end-to-end encryption. The results indicate a significant improvement in encryption and decryption efficiency, showcasing the scheme's potential as a viable solution against the vulnerabilities posed by quantum computing advancements. Our research offers a novel perspective on a critical aspect of cybersecurity applications across healthcare, defence, finance, and beyond in the realm of secure quantum communication.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"6 1","pages":""},"PeriodicalIF":2.8000,"publicationDate":"2025-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.70016","citationCount":"0","resultStr":"{\"title\":\"Quantum Secure Image Transmission: A Chaos-Assisted Quantum Key Distribution Approach Using Entanglement\",\"authors\":\"Raiyan Rahman, Md Shawmoon Azad, Mohammed Rakibul Hasan, Syed Emad Uddin Shubha, M. R. C. Mahdy\",\"doi\":\"10.1049/qtc2.70016\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The emergence of quantum computing has introduced unprecedented security challenges to conventional cryptographic systems, particularly in the domain of classical communications. Our research addresses these challenges by creatively combining quantum key distribution (QKD), specifically the E91 protocol, with logistic chaotic maps to establish a secure image transmission scheme. Our approach utilises the pseudo-randomness of chaotic systems alongside the security mechanisms inherent in quantum entanglement-based protocols. This framework leverages the E91 protocol for secure quantum key distribution to generate identical key pairs at both ends, followed by chaos encryption using the key as a basis for the parameters. This framework utilises the E91 protocol for secure quantum key distribution, leveraging maximally entangled pairs and CHSH inequality tests to detect eavesdropping and potential double-agent attacks by identifying nonentangled qubits, therefore maintaining key confidentiality. Furthermore, through quantitative simulations, we demonstrate the effectiveness of this scheme through key space and key sensitivity analysis, histogram analysis, information entropy analysis, execution time analysis, and differential attack analysis in end-to-end encryption. The results indicate a significant improvement in encryption and decryption efficiency, showcasing the scheme's potential as a viable solution against the vulnerabilities posed by quantum computing advancements. Our research offers a novel perspective on a critical aspect of cybersecurity applications across healthcare, defence, finance, and beyond in the realm of secure quantum communication.</p>\",\"PeriodicalId\":100651,\"journal\":{\"name\":\"IET Quantum Communication\",\"volume\":\"6 1\",\"pages\":\"\"},\"PeriodicalIF\":2.8000,\"publicationDate\":\"2025-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.70016\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IET Quantum Communication\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/qtc2.70016\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"QUANTUM SCIENCE & TECHNOLOGY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Quantum Communication","FirstCategoryId":"1085","ListUrlMain":"https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/qtc2.70016","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"QUANTUM SCIENCE & TECHNOLOGY","Score":null,"Total":0}
Quantum Secure Image Transmission: A Chaos-Assisted Quantum Key Distribution Approach Using Entanglement
The emergence of quantum computing has introduced unprecedented security challenges to conventional cryptographic systems, particularly in the domain of classical communications. Our research addresses these challenges by creatively combining quantum key distribution (QKD), specifically the E91 protocol, with logistic chaotic maps to establish a secure image transmission scheme. Our approach utilises the pseudo-randomness of chaotic systems alongside the security mechanisms inherent in quantum entanglement-based protocols. This framework leverages the E91 protocol for secure quantum key distribution to generate identical key pairs at both ends, followed by chaos encryption using the key as a basis for the parameters. This framework utilises the E91 protocol for secure quantum key distribution, leveraging maximally entangled pairs and CHSH inequality tests to detect eavesdropping and potential double-agent attacks by identifying nonentangled qubits, therefore maintaining key confidentiality. Furthermore, through quantitative simulations, we demonstrate the effectiveness of this scheme through key space and key sensitivity analysis, histogram analysis, information entropy analysis, execution time analysis, and differential attack analysis in end-to-end encryption. The results indicate a significant improvement in encryption and decryption efficiency, showcasing the scheme's potential as a viable solution against the vulnerabilities posed by quantum computing advancements. Our research offers a novel perspective on a critical aspect of cybersecurity applications across healthcare, defence, finance, and beyond in the realm of secure quantum communication.