Preview

Bulletin of State University of Education. Series: Physics and Mathematics

Advanced search

SOLITON SIMULATION OF QUANTUM KEY DISTRIBUTION

https://doi.org/10.18384/2310-7251-2020-2-94-101

Abstract

Purpose is to assert that quantum entanglement is the main tool for communication and information processing. Methodology and Approach. Quantum key distribution protocols and problems of their protection were studied with the soliton model of entangled photons. They were evaluated hacking risks transmitting information between the legitimate users. The risks of hacking information transfer between legitimate users were assessed. There is also used a simple dichotomous signal generating method. This method can be the basis of probabilistic modeling of quantum states. Quantum Cryptographic Systems can be partially simulated on a classical computer with entangled soliton model, because quantum entanglement is the main tool for communication and information processing. Results. It is shown that the BB84 protocol is an unconditional security protocol using photon polarization between remote channels. Secret keys are used when transmitting information between spatially separated (remote) users. Theoretical and/or Practical implications. Using soliton modeling of quantum objects, it is possible to imitate their behavior and use some of their advantages on a classical computer. To a large extent, this can be done with the practical use of such a modeling method in the field of cryptography. A good imitation of quantum cryptographic processes by this method opens up prospects for the application of the soliton method for another use of quantum theory in practice.

About the Authors

M. H. Chan
Moscow Institute of Physics and Technology (National Research University)
Russian Federation


Ni. A. Zar
Moscow Institute of Physics and Technology (National Research University)
Russian Federation


T. F. Kamalov
Moscow Institute of Physics and Technology (National Research University)
Russian Federation


References

1. Visualization of the birth of an optical vortex using diffraction from a triangular aperture / Mourka A., Baumgartl J., Shanor C., Dholakia K., Wright E. M. // Optics Express. 2011. Vol. 19. Iss. 7. P. 5760-5771.

2. Dusek M., Lutkenhaus N., Hendrych M. Quantum cryptography // Progress in Optics. Vol. 49 / edited by E. Wolf. New York: Elsevier, 2007. P. 381-454.

3. Bennett C. H., Brassard G. Quantum cryptography: Public key distribution and coin tossing // Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing (Bangalore, India, December 10-12, 1984). New York: IEEE, 1984.P. 175-179.

4. Rybakov Yu. P., Kamalov T. F. Probabilistic Simulation of Quantum Computation // Quantum Computers and Computing. 2006. Vol. 6. No. 1. P. 125-136.

5. Kamalov T. F. Hidden variables and the nature of Quantum Statistics // Journal of Russian Laser Research. 2001. Vol. 22. No. 5. P. 475-479.

6. Rybakov Yu. P, Kamalov T. F. Bell’s theorem and Entangled Solitons // International Journal of Theoretical Physics. 2016. Vol. 55. Iss. 9. P. 4075-4080.

7. Rybakov Yu. P, Kamalov T. F. Entangled optical solitons in non-linear Kerr dielecrtic // Proceedings of SPIE. Vol. 6729. ICONO 2007: Coherent and Nonlinear Optical Phenomena (1 June 2007, Minsk, Belarus). Bellingham, WA, United States: SPIE-The International Society for Optical Engineering, 2007. P. 67291T.

8. Неравенства Белла и корреляции ЭПР-Бома: действующая классическая радиочастотная модель / Евдокимов Н. В., Клышко Д. Н., Комолов В. П., Ярочкин В. А. // Успехи физических наук. 1996. № 166. С. 91-107.


Review

Views: 143


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2949-5083 (Print)
ISSN 2949-5067 (Online)