Quantum cryptographic protocols with dual messaging system via 2D alternate quantum walk of a genuine single-photon entangled state

Dinesh Kumar Panda,Colin Benjamin
2024-09-15
Abstract:A single-photon entangled state (or single-particle entangled state (SPES) in general) can offer a more secure way of encoding and processing quantum information than their multi-photon (or multi-particle) counterparts. The SPES generated via a 2D alternate quantum-walk setup from initially separable states can be either 3-way or 2-way entangled. This letter shows that the generated genuine three-way and nonlocal two-way SPES can be used as cryptographic keys to securely encode two distinct messages simultaneously. We detail the message encryption-decryption steps and show the resilience of the 3-way and 2-way SPES-based cryptographic protocols against eavesdropper attacks like intercept-and-resend and man-in-the-middle. We also detail the experimental realization of these protocols using a single photon, with the three degrees of freedom being OAM, path, and polarization. We have proved that the protocols have unconditional security for quantum communication tasks. The ability to simultaneously encode two distinct messages using the generated SPES showcases the versatility and efficiency of the proposed cryptographic protocol. This capability could significantly improve the throughput of quantum communication systems.
Quantum Physics,Disordered Systems and Neural Networks,Cryptography and Security,Quantum Algebra,Optics
What problem does this paper attempt to address?
The problem that this paper attempts to solve is: how to use the truly three - party or non - local two - party single - particle entangled states (SPES) generated by a single photon to realize a secure quantum communication protocol for simultaneously encrypting two different messages through two - dimensional alternating quantum walk (AQW). Specifically, the paper proposes a quantum encryption scheme based on 2D AQW, which can generate highly entangled quantum states among three degrees of freedom (orbital angular momentum OAM, path, and polarization) using a single photon, and use these entangled states as encryption keys to simultaneously encrypt and decrypt two different messages. In addition, the paper also analyzes in detail the robustness of this protocol against eavesdropping attacks (such as intercept - resend and man - in - the - middle attacks), and provides an experimental implementation scheme. ### Main Contributions 1. **Efficient Resource Utilization**: The method proposed in the paper uses only a single photon, reducing the resources required by traditional multi - photon protocols. 2. **High Security**: Through the generated three - party or non - local two - party single - particle entangled states, this protocol has unconditional security in quantum communication tasks. 3. **Simultaneous Encryption of Multiple Messages**: It can simultaneously encrypt two different messages in one communication, significantly improving the throughput of the quantum communication system. 4. **Experimental Feasibility**: It describes in detail the experimental implementation method using a single photon, including the specific circuit designs for generating public keys and decrypting messages. ### Technical Details - **Entangled State Generation**: Generate three - party or non - local two - party single - particle entangled states from the initial separated state through 2D AQW. The degree of entanglement can be controlled by adjusting the initial state and evolution operator parameters. - **Encryption and Decryption Steps**: - **Generate Public Key**: The receiver (Bob) generates a three - party entangled public key and sends it to the sender (Alice) through the quantum channel. - **Message Encryption**: Alice encodes two messages into the x and y position degrees of freedom of the photon respectively through specific displacement operations. - **Message Decryption**: After receiving the encoded quantum state, Bob restores the original messages through reverse operations. - **Security Analysis**: Through detailed mathematical proofs, it shows the robustness of this protocol against various eavesdropping attacks, including intercept - resend and man - in - the - middle attacks. ### Experimental Implementation - **Photon Circuit Design**: Use a single - photon source to map the OAM, path, and polarization of the photon to the position x degree of freedom, y degree of freedom, and coin degree of freedom of 2D AQW respectively. - **Optical Devices**: Use passive optical devices such as polarization beam splitters (PBS) and Jones plates (J - plate) to realize the generation and decoding of quantum states. ### Conclusion The quantum encryption protocol based on 2D AQW proposed in this paper is not only more efficient in resource utilization but also excellent in security. Through experimental implementation, this protocol shows its feasibility and potential in practical applications, providing new ideas for the development of quantum communication technology.