scispace - formally typeset
Open AccessJournal ArticleDOI

Analysis of atmospheric effects on satellite based quantum communication: A comparative study

TLDR
In this article, an analysis is made for satellite based quantum communication using QKD protocols using free space optical (FSO) links, and the results obtained indicate that SARG04 protocol is an effective approach for satellite-based quantum communication.
Abstract
Quantum Key Distribution (QKD) is a key exchange protocol which is implemented over free space optical links and optical fiber cable. When direct communication is not possible, QKD is performed over fiber cables, but the imperfections in detectors used at receiver side and also the material properties of fiber cables limit the long distance communication. Free space based quantum key distribution is free from such limitations, and can pave way for satellite based quantum communication to set up a global network for sharing secret messages. To implement free space optical (FSO) links, it is essential to study the effect of atmospheric turbulence. Here, an analysis is made for satellite based quantum communication using QKD protocols. The results obtained indicate that SARG04 protocol is an effective approach for satellite based quantum communication.

read more

Citations
More filters

The quantum theory of light.

Rodney Loudon
TL;DR: In this article, the Planck's radiation law and the Einstein coefficients were used to describe the atom-radiation interaction and the quantum mechanics of optical fluctuations and coherence, respectively.

Daylight Quantum Key Distribution over 1.6 km

TL;DR: Quantum key distribution has been demonstrated over a point-to-point 1.6-km atmospheric optical path in full daylight, bringing QKD a step closer to surface- to-satellite and other long-distance applications.
Journal ArticleDOI

Decoherence can help quantum cryptographic security

TL;DR: In this paper, the authors show that the security of the ping-pong protocol against a noise-restricted adversary improves under a non-unital noisy channel, but deteriorates under unital channels.
Journal Article

Optical antenna gain. I, Transmitting antennas

B. J. Klein, +1 more
TL;DR: In this article, a simple polynomial equation is derived for matching the incident source distribution to a general antenna configuration for maximum on-axis gain, resulting in near and far-field antenna gain patterns, assuming a circular antenna illuminated by a laser operating in the TEM(00) mode.
Posted Content

Analysis of Quantum Key Distribution based Satellite Communication

TL;DR: In this paper, the noisy quantum channel is modeled and implemented by the redundancy-free quantum error correction scheme which provides better security and throughput efficiency as shown in simulation results. But, errors occur due to decoherence.
References
More filters
Journal ArticleDOI

Quantum Cryptography

TL;DR: The author revealed that quantum teleportation as “Quantum one-time-pad” had changed from a “classical teleportation” to an “optical amplification, privacy amplification and quantum secret growing” situation.
Journal ArticleDOI

Quantum cryptography

TL;DR: A protocol for coin-tossing by exchange of quantum messages is presented, which is secure against traditional kinds of cheating, even by an opponent with unlimited computing power, but ironically can be subverted by use of a still subtler quantum phenomenon, the Einstein-Podolsky-Rosen paradox.
Book

Fundamentals of Photonics

TL;DR: The Fundamentals of Photonics, Third Edition as discussed by the authors is a self-contained and up-to-date introductory-level textbook that thoroughly surveys this rapidly expanding area of engineering and applied physics.
Book

The quantum theory of light

Rodney Loudon
TL;DR: In this paper, the Planck's radiation law and the Einstein coefficients were used to describe the atom-radiation interaction and the quantum mechanics of optical fluctuations and coherence, respectively.
Journal ArticleDOI

The security of practical quantum key distribution

TL;DR: Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
Related Papers (5)