Communication Lab Report 1
Communication Lab Report 1
Abstract — This report outlines the activities undertaken during a lab session focused on the implementation
of secret sharing schemes using Vandermonde matrices. The objective was to encode a secret password into
multiple shares, simulate the loss of a share, and successfully reconstruct the original password from the remaining
shares. This process demonstrates the robustness and reliability of secret sharing schemes in safeguarding sensitive
information.
1
1.4 Conclusion:
The lab successfully illustrated the efficacy of secret sharing schemes, particularly the McEliece-Sarwate scheme,
in ensuring data security even in the event of partial data loss. The mathematical underpinnings of finite field
operations and Vandermonde matrices provided a strong foundation for the secure and reliable reconstruction of
the original secret message
2
2.4 Quantum Measurements
In quantum mechanics, particles like photons or electrons are described by a wave function, which encompasses all
the possible states they can be in. When a measurement is made, this wave function ’collapses’ to a particular state.
This means that prior to measurement, the particle can be in a superposition of states, but measurement forces it
into one specific state.
3
4 Entanglement-Based Protocols
4.1 Description of Entanglement-Based QKD
Fundamental Principle: These protocols use quantum entanglement, where pairs of particles are generated in a
state such that the state of one (say, photon) is directly related to the state of the other, regardless of the distance
between them. Key Generation: Information is encoded in the entangled states. Measurements on these entangled
particles by the sender (Alice) and receiver (Bob) result in correlated outcomes, which can be used to generate
a secure key. Eavesdropping Detection: Any attempt to intercept the communication disturbs the entanglement,
which can be detected through changes in the correlation pattern of the measurement results.
4
• Entanglement-Based Protocols: More complex in terms of implementation. Require the generation and
detection of entangled photon pairs, which can be technologically challenging and resource-intensive. E91,
BBM92, and similar protocols demand a higher level of control over quantum states.
5
• Improvements in Technology: Continued advancements in photonics, quantum sources, and detectors are
expected to enhance the efficiency and reliability of QKD systems.
7 conclusion
Quantum Key Distribution represents a significant breakthrough in the field of secure communication, harnessing
the principles of quantum mechanics to offer a level of security that is theoretically unbreakable. The future of
QKD has several potential applications ranging from secure governmental communications to safeguarding global
financial transactions. As quantum computing continues to evolve, the role of QKD in securing communication
against quantum threats becomes increasingly vital, making it a key area of focus in the realm of cybersecurity and
quantum information science.
8 references
References
[1] Valerio Scarani, Helle Bechmann-Pasquinucci, Nicolas J. Cerf, Miloslav Dušek, Norbert Lütkenhaus, and
Momtchil Peev, The security of practical quantum key distribution, Journal Name, Year.
[2] Feihu Xu, Xiongfeng Ma, Qiang Zhang, Hoi-Kwong Lo, and Jian-Wei Pan, Secure quantum key distribution
with realistic devices, Journal Name, Year.
[3] Yuan Cao, Yongli Zhao, Senior Member, IEEE, Qin Wang, Jie Zhang, Soon Xin Ng, Senior Member, IEEE,
and Lajos Hanzo, Life Fellow, IEEE, The Evolution of Quantum Key Distribution Networks: On the Road to
the Qinternet, Journal Name, Year.
[4] Alberto Boaron et al., Secure Quantum Key Distribution over 421 km of Optical Fiber, Journal Name, Year.
[5] Shuang Wang et al., Twin-field quantum key distribution over 830-km fibre, Journal Name, Year.
[6] Leong-Chuan Kwek et al., Chip-based quantum key distribution, Journal Name, Year.
[7] R. Ursin et al., Entanglement-based quantum communication over 144km, Journal Name, Year.
[8] M. Sasaki et al., Field test of quantum key distribution in the Tokyo QKD Network, Journal Name, Year.
[9] Pei Zeng, Hongyi Zhou, Weijie Wu, and Xiongfeng Ma, Mode-pairing quantum key distribution, Journal
Name, Year.