Enhancing Quantum Key Distribution Protocols for Extended Range and Reduced Error
Publié en ligne: 30 sept. 2024
Pages: 13 - 23
DOI: https://doi.org/10.2478/ijanmc-2024-0022
Mots clés
© 2024 Amina Alkilany Abdallah Dallaf, published by Sciendo
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Quantum Key Distribution (QKD) has clearly standout in quantum network approach due to its ability to secure communication as it allows a shared secret key to be produced between two parties by quantum procedure. However, during practical implementation it faces some challenges such as high error rates and limited distance of transmission [1] and [2]. To support QKD many protocols have been used such as BB84 that recommended by [3], this study has placed the foundation elements of QKD and has been widely studied for securing key exchange in quantum procedure. Despite the strength of BB84 there are some limitations appear during practical implementations such as photon loss and high error rates over long distances. Many researchers have produced various works for improving these aspects using advanced error correction techniques and new protocol designs. First studies handled such approaches are [4] and [5] and have been applied to extend the range of quantum communication networks ever since. Another remarkable technique is entanglement swapping; it is generated between two distant particles that have never been directly interacted together. Using this technique in QKD protocols has made it more capable in mitigating photon loss, enabling longer distances of transmission and resulted in more enhanced QKD systems [6] and [7]. However, [8] stated that entanglement swapping requires sophisticated quantum operations and high-precision measurements, added to this, it increased the overall complexity and cost of the QKD system. Scaling entanglement swapping to larger networks introduces further challenges related to the maintenance of entanglement fidelity and synchronizing the operations of multiple nodes. Error correction is critical for the implementation of QKD because quantum channels are disposed to errors from many sources. Low-Density Parity-Check (LDPC) codes which are introduced by [9], [10] and [11] is an error-correcting code used to transmit data over noisy communication channels. LDPC is efficient and effective in correcting errors so it is widely used in modern communication systems such as digital television, wireless networks, and data storage devices because its performance is almost optimal and has low computational complexity. LDPC codes have very good error correction performance whereas it has shortcomings as it is resource intensive and requires huge computational power and memory, which may not be possible in all practical set-ups. Also, the effectiveness of LDPC diminishes with the shortening of key lengths, thus posing a challenge for systems requiring secure key generation at rapid times. In quantum communication repeaters mitigating photon loss and extending the transmission distance but they have implementation complexity as they still require quite precise quantum state manipulations and entanglement purification processes, this could be hard to realize in practice. Moreover, it is difficult to ensure operational stability of quantum repeaters over long periods against decoherence and other quantum noise factors [12]. Using LDPC codes to QKD have proved to have significant reductions in Quantum Bit Error Rate (QBER) resulting in more secure communication over longer distances and make it even more possible. Improvements by LDPC codes are based on ideal conditions of real quantum channels that may not exist. Wide gaps hence exist between the theoretical and practical performances. The practical implementations of the codes would introduce supplementary overheads in enhanced latency and complexity in the QKD system. [13] and [14]. A study that secured quantum communication with low error rates was conducted by [15] it focused on implementing advanced error correction techniques in QKD and it achieved a lower QBER and a secured longer distance communication. It is also stated that advanced error correction techniques typically require high computational resources, which are not always available in every quantum communication setup. The integration of advanced error correction techniques into existing QKD systems could be rather challenging since huge modifications and optimizations would be involved. Another study used multi-hop quantum repeater networks was conducted by [16] it discussed the use of multi hop quantum repeaters as it significantly extended the range of QKD protocols and enabled even more secure communication over continental distances. However; it means that in a multi-hop quantum repeater network, exact synchronization over multiple nodes is hard to achieve in practice, hence further increasing the error rates. Additional latency contributed by each hop in the network may make real-time secure communication over very long distances less feasible. Another method was prepared by [17] which is hybrid quantum classical error correction method it has been used to enhance QKD, it has combined quantum and classical error correction codes, its result has improved the reliability and efficiency of QKD systems; the merging with quantum and classical error correction codes, in turn, makes them fit together perfectly for maximum performance, which implies that the technical challenge of integration can be very high. Hybrid methods will naturally impose increased complexity in the QKD system, for starters, which implies that experts in both quantum and classical error correction techniques are needed. Many protocols in this field have been used such as E91, Decoy State, CV-QKD, MDI-QKD, and TF-QKD; outputs of this work will be compared to such protocols results to evaluate the proposed protocols and highlighting its efficiency.
By addressing these shortcomings, this paper not only highlights the advancements made in QKD protocols but also demonstrates how the proposed solutions contribute to more secure and efficient quantum communication systems.
The objective of this research is to introduce an optimized QKD protocol that enhances the reliability of the key distribution process over longer distances by creating entangled pair at intermediate node through entanglement swapping in order to mitigate photon loss and reduce error rates. The maximal transmission distance is increased using advanced error correction techniques and entanglement swapping through this protocol. This reduction in complexity and cost of QKD systems is achieved by simplifying the implementation of entanglement swapping through a streamlined approach that concentrates on critical steps such as generating entangled photon pairs and performing efficient Bell state measurements. This strategy makes it practical for large scalable networks with multiple nodes, where maintaining entanglement fidelity and synchronizing operations across multiple nodes are critical. It solves the resource-intensive nature of LDPC codes by addressing its computational power balance with memory requirements for these codes while adapting their error correction process to specific needs of QKD system without consuming too many resources. Its goal is to use certain techniques that improve effectiveness even with shorter key lengths, so that secure keys could be generated quickly without compromising on error correction capabilities associated with LDPC. The complexity of quantum repeaters implementation; this protocol has reduced the quantum repeater designs to simple ones that basically handle important manipulations of quantum states and entanglement purification processes, making their practical implementations more feasible as well as implementing robust error correction and entanglement swapping techniques that counter decoherence and other quantum noise factors resulting in an uninterrupted performance over long durations. The paper accounts for realistic quantum channel conditions when implementing LDPC codes, hence bridging the gap between theoretical results obtained by analysis and actual system performance. Simulations reflecting real-world scenarios serve as a basis for validating the proposed approach in diverse environments so it remains efficient and responsive by minimizing additional overheads introduced by LDPC codes through optimization of the error correction process. Use advanced error correction methods that are limited only by computation cost, deploying them into different quantum communication settings without excessive use of computer resources. The proposed protocol is developed for seamless the integration with existing QKD systems by avoid the need for a lot of modifications and permitting straightforward application of advanced error correction techniques. Ensuring accurate timing on multi-node quantum repeater network also implementing precise synchronization mechanisms is done in order to have minimum likelihood of increased error rates. The protocol in this paper reduces latency by optimizing hopping thus allowing real time secure communication over continental distances. This work provides a clear framework for integrating quantum error correction codes with classical ones so that they remain compatible and give an optimal performance. This protocol combines the strengths from both quantum as well as classical techniques thereby leading to improved effectiveness and reliability of QKD system as a whole. The protocol is designed to handle increased complexity by adopting modularity that simplifies hybrid error correction integration making it more users friendly and accessible. Then, comparative results based on previous literature outputs with BB84, E91, Decoy State, CV-QKD, MDI-QKD, and TF-QKD, referenced in table 4 to prove the superiority of proposed approach in terms of extended secure communication distance, higher key generation rate, and improved resilience to attacks.
The Optimized Quantum Key Distribution (QKD) Protocol proposed in this methodology should be used with the key reasons that this approach provides improvements over the classical QKD technique.
The key improvement is the Entanglement Swapping; the procedure is done by the following steps: Step A: Intermediate Node Entangled Photon Pair Generation Procedure: At each intermediate node, entangled photon pairs are generated using the process similar to SPDC. It takes a high-energy photon, passing through the nonlinear crystal, and splits into two lower-energy entangled photons. These entangled pairs are distributed to a set of other nodes or users within the network. Step B: Entanglement Swapping Photon Pairing: An individual node in a network picks one photon that, through the process of entanglement, links with another photon originating from a neighboring node. Measurements on Bell State: The incoming photons are then measured using a beam splitter; quantum gates consisting of several quantum operations, such as CNOT and Hadamard gates, are applied in projecting the photons into a Bell state. Such an entangling of photons from different pairs links the measurement of Bell states with the entanglement between distant nodes, resulting in a possibility of secure longer distance communication. These now make it possible to have secure long distance communication even among nodes that are not directly interacting. Step C: Secure Key Generation QKD Process Subsequent to the generation of entangled pairs between remote nodes, Quantum Key Distribution can be carried out. The protocol is such that each node must measure the state of its photon in a randomly selected basis—a rectilinear or a diagonal one. The data obtained from the measurement is transmitted through a classical channel in order to obtain a secure cryptographic key. The fundamentally induced nature of quantum mechanics guarantees security for the key because any eavesdropping attempt will make entanglement be disrupted and hence will be noticed. This process can be further outlined in clearer steps of Entanglement Swapping: Initial Entanglement: Two pairs of entangled photons are created: one pair shared between nodes A and B, and the other between nodes B and C. Bell State Measurement at Node B: Because node B belongs to both sets, it performs a Bell state measurement on these two photons. This is achieved by combining the two photons on a beam splitter and then measuring their states with detectors. The result of this measurement gives whether the photons are in some kind of Bell state. Entanglement Extension: Measurement of the Bell state at node B means that the rest of the photons, which are left at nodes A and C and are not part of the measurement itself, now find themselves in an entangled state. In other words, this extends entanglement from node A to node C in such a way that, with the help of entangled photon pairs, quantum communication is securely established over a long distance without direct transmission of photons over the whole distance. The efficiency of this technique is attributed to the ability of a quantum network to compensate for the distance restriction via entanglement swapping. By the insertion of intermediate nodes and entanglement swapping, the network ensures quality entanglements over a much longer distance than that achievable via direct transmission. Furthermore, in terms of security, any effort of eavesdropping caused detectable anomalies in the entangled states. Advanced Error Correction Methods will be implemented in quantum channels using Low-Density Parity-Check codes. The second step will be applied in quantum channels using Low-Density Parity-Check codes. It is characterized by the use of a sparse bipartite graph to represent it, whereby one set of nodes represents the codeword bits (variable nodes), and another represents the parity check restrictions (check nodes). Even with enormous block sizes, fast decoding can take place because of the structure of the sparse graph. The first phase is the Encoding Process, which is obtained by: Parity-Check Matrix (H): The first step in the process of encoding is the construction of the parity check matrix H, where interconnections between the variable and check nodes are represented. Since a check matrix is by nature sparse, this means that complexity in both encoding and decoding processes, which comes to reality because most of its entries are zeros and ones, is minimal. Generator Matrix (G): The generator matrix G is built from the parity check matrix H. A codeword c is generated by the input data bits d, multiplied by a generator matrix G. Then, it implies Data Transmission: The quantum information encoded is represented by the codeword c in a quantum channel. Inheriting noise channels, quantum communication may lead to errors in the sent codeword. Error Detection: The parity check conditions associated with the LDPC code are useful in detecting and correcting errors because, during transmission, errors may occur due to a variety of reasons. For instance, there may be photon loss, detector inefficiencies, and environmental noise. Decoding Procedure: Received Codeword (r): This is the noisy version of the transmitted codeword, and its value is symbolized as r. The received codeword may contain errors due to numerous noise sources mentioned previously. Belief Propagation Algorithm (BP): It mplements the decoding iterative process through the following steps: Initialization: Likelihood ratios for each received bit, indicating a possibility to be a 0 or 1, are first initialized by the decoder. Message Passing: Iteratively, the algorithm, using information gathered from neighboring check nodes, starts changing the likelihoods of all bits. The bipartite network consists of edges that pass messages. Each check node passes an updated message to all its neighboring variable nodes and vice versa. Convergence: The iterative algorithm runs up to a maximum iteration number or until the likelihood ratios converge; in other words, the messages no longer change too much. The decoded codeword c^ results from the final decisions that are taken on the basis of the likelihood ratios for every bit. Error Correction: If the decoded codeword c^ fulfills the parity check Incorporation with Quantum Key Distribution: The incorporation of LDPC codes in the quantum communication process significantly enhances the error correction capability, resulting in more robust and reliable quantum key distribution over long distances. The following detailed steps offer a clearer understanding of how LDPC codes are applied within the optimization protocol. Error Rate Management: For managing and correcting errors while quantum communication is in progress, the QKD protocol incorporates LDPC codes. In quantum key distribution, to maintain security, the error correction procedure is crucial to ensure that the generated key is the same at both the sender's end (A) and the receiver's end (B) and to guarantee that it matches. Privacy Amplification: After error correction, privacy amplification is the following step. This procedure eliminates any remaining information that might be available to an eavesdropper, ensuring that the final shared key is secure. Optimization of Performance: LDPC Code Parameters Selection: The parameters are chosen from block length and sparsity of the parity check matrix to the number of iterations in the decoding process based on the specifics of a quantum channel, such as noise level and key generation rate; afterward, they are optimized to balance error correction performance with computational efficiency. Multihop Quantum Repeaters: This system can lead to great improvements in the ability of QKD. Therefore, enabling quantum key transmissions over very large distances, by using multihop quantum repeaters, can eliminate these limitations currently on direct quantum communication. Thus, quantum repeaters play a great part in advanced quantum networks. There are several reasons they would be useful and also the numerous objectives that they accomplish, among which include: Overcoming Distance Limitations: Amplification is a method to boost the signal strength over long distances in classical communication. Due to the no-cloning theorem, direct amplification of quantum states cannot be performed in quantum communication. This problem is overcome with the help of quantum repeaters, allowing for longer-range quantum communication without the direct transmission of entangled photons across the whole distance. Extended Transmission Range: Quantum repeaters enable QKD systems to scale through much longer distances with very low degradation of signal quality and security because communication distance is sliced into smaller hops. This process is scalable to cover continental or even global distances. Structure and Functionality: Entanglement Distribution: A quantum repeater node does pair creation with an entanglement source. Subsequently, it distributes the creation to the neighbors in the network. This way, it creates entanglement between distant nodes. Entanglement Swapping: The quantum repeater protocol links photon pairs that are created between neighboring nodes. This entanglement is further extended to cover long distances through measurements of Bell states. Error Correction and Purification: The idea of error correction and purification for entanglement protocols is to keep high-fidelity entanglement, with the assistance of quantum repeaters, filtering away the errors and noise, in a way that will ensure the security of QKD. Multi-Hop Configuration: Multi-Hop Setup: A multi-hop configuration of the quantum repeater decomposes the communication distance into smaller hops, where each hop is a connection from one quantum repeater to another for swapping and purification. Cascading Entanglement: Entanglement swapping in such a setup cascades through all the repeater nodes, extending the link over the whole communication distance and enabling secure distribution of quantum keys over a much larger distance than with direct transmissions. Implementation Considerations: Synchronization: The proper operation of a multi-hop network would require the right timing of actions between all quantum repeater nodes, entanglement swapping operations, and measurements to sustain the entangled state. Resource Management: Multi-hop quantum repeaters can work in an efficient and reliable way only if quantum resources, such as pairs of entangled photons or error correction codes, are managed carefully. Hybrid Quantum-Classical Error Correction: Hybrid quantum-classical error correction algorithms enhance the reliability and efficiency of the QKD system by combining quantum and classical techniques in a modular approach to handle complexity, including hybrid error correction methods. Afterward, a Simulation Setup with the Quantum Network Simulator (QNSim) was conducted to model the performance of the optimized QKD protocol.
Photon Loss Rate (0.2 dB/km): An average performance for the conventional single-mode optical fibers used in quantum communication has been with a photon loss rate of 0.2 dB/km. This represents attenuation in photons when they travel through the fiber and needs to be included to faithfully simulate the problems of QKD caused by very long-distance communication. Losses of optical fibers in the whole wavelength window of telecommunications (about 1550 nm) are at the level of 0.2 dB/km, which justifies using this parameter to give a realistic assessment of the performance under normal working conditions.
Efficiency of the Detector (80%): This indicates the level of performance that is possible to obtain with the best single photon detectors available today, including those produced using superconducting nanowire technology. It is a critical parameter for QKD because it determines the percentage of incoming photons that the system can successfully detect. Selecting 80% is a compromise between the need to keep the detection efficiency high to minimize error rates and maximize secure transmission distances, and how closely the system reflects actual performance in real-world installations.
Dark Count Rate (1e-6 per gate): 1×10^ – 6 per gate dark count rate corresponds to the probability that a false detection event might happen in the absence of a photon. This is a very significant rate for quantum communication, as errors can occur through false detection during key generation. This value for the dark count rate was chosen to reflect the performance of modern single photon detectors, especially those operating under cryogenic conditions where dark counts are minimized. This also ensures that the noise present in real QKD implementations is properly simulated.
In general, the chosen parameters for the simulation are a compromise between realism and not pushing the current quantum communication technology too strongly. This 0.2 dB/km photon loss rate is based on the normal range of attenuation observed in single-mode optical fibers operating at telecommunication wavelengths. We have configured it to 80% detector efficiency, corresponding to the highest efficiencies of superconducting nanowire detectors reached with high-performing QKD systems. The chosen dark count rate of 1×10^ – 6per gate emulates the current achievable low noise environment of cryogenic detectors to ensure the simulation is representative of the difficulties and limitations faced in realistic quantum communication configurations.
Finally; the simulation of the results has obtained through implementing MATLAB code used some parameters and functions such as stepsize parameter is reduced to 5 km for finer granularity in distance measurement. Whereas six main functions used are as the following:
calculateQBER; this function has been used to computes the QBER based on distance, photon loss, detector efficiency, and dark count rate. maxDistanceQKD; this function has been used to calculate the maximum distance for a given QBER threshold iteratively. A function called for standard BB84 has been used to calculate the QBER and maximum distance for the BB84 protocol. Applying the calculation of the QBER and maximum distance related to optimize QKD is done by using optimized QKD function. Then photon loss rate is divided into halves to simulate entanglement swapping. Comparing the improvement in transmission distance using improvement check. Lastly, visualizing the QBER vs. distance by plotting the results for both protocols and then displays the maximum distances.
Improvement in QBER is measured by comparing the Quantum Bit Error Rate (QBER) for the standard BB84 Protocol with that for the optimized Quantum Key Distribution (QKD) Protocol over the same distance. In other words, improvement is obtained in terms of a percentage reduction in QBER, which tells how much less error the optimized protocol has. Improvement in QBER can be quantified by the following standard formula, which is the ratio of the reduction in percentage error rate with respect to a reference system: generally similar to many of the approaches followed in quantum communication system performance evaluations. [18] and [19].
The results of these improvement techniques are combined in the methodology that clearly indicates significant improvements in the QBER and maximum transmission distance, which verifies the theoretical and practical advantages of the optimized QKD protocol. Simulation results and theoretical analyses presented here demonstrate a substantial improvement in both quantum bit error rate (QBER) and maximum transmission distance when using the optimized quantum key distribution protocol compared to the standard BB84 protocol.
The optimized QKD protocol considerably increases the maximum transmission distance. Entanglement swapping is introduced to allow secret key generation over longer transmission distances, which corrects photon loss in an efficient manner. A further decrease in QBER using LDPC codes was employed, especially over long distances. It is due to the enhanced error correction capabilities that LDPC codes can therefore be particularly suitable for QKD, where they can enable efficient error correction, thus reducing QBER.
Table I illustrates the QBER for various distances using both the standard BB84 and the optimized QKD protocol.
O
Distance (km) | BB84 QBER (%) | Optimized QKD QBER (%) |
---|---|---|
50 | 1.2 | 0.9 |
100 | 2.5 | 1.8 |
125 | N/A | 2.3 |
150 | N/A | 3.0 |
175 | N/A | 3.8 |
As shown in Table I, the BB84 protocol's effectiveness diminishes beyond 100 km, where QBER values are marked as N/A. However, the optimized QKD protocol continues to deliver lower QBER values, indicating its superior performance over extended distances.
Theoretical analysis of the optimized protocol confirms that the use of entanglement swapping and LDPC codes does not compromise security [20]. Instead, these enhancements maintain the integrity of the shared key, assured by quantum mechanics principles.
Figure 1 illustrates the performance of the optimized QKD protocol in comparison with the standard BB84 protocol, focusing on QBER and transmission distance.

QBER vs optimized QKD Protocols
Standard BB84 Protocol:
Maximum Transmission Distance: 100 km
QBER at 100 km: ~2.5%
Optimized QKD Protocol:
Maximum Transmission Distance: 125 km (25% improvement)
QBER at 125 km: ~2.3% (lower than BB84 at 100 km)
The results confirm that the optimized QKD protocol is more effective in reducing QBER and extending transmission distance, making it more robust for long distance quantum communication.
Increased Transmission Distance: This can make the optimized protocol extend the transmission distance to 25% through entanglement swapping, further extended to 50% with advanced error correction techniques, and a total of 100% when multi-hop quantum repeaters are considered.
Lower QBER: Use of LDPC code made the QBER brought down significantly, especially at longer distances, thus making the overall transmission very reliable.
Improved Security: The application of quantum mechanics principles enhances and maintains the security of the protocol, thus making it practically implementable in a more global way within network infrastructures. As the simulation results show, the enhancements of the QKD enable practical deployment of them in wider ways over network infrastructures.
This work compares the optimized QKD protocol with existing QKD protocols like BB84, E91, Decoy State, CV-QKD, MDI-QKD, and TF-QKD. The comparison is done in terms of security, key rate, communication distance, implementation complexity, and resistance to attacks.
As a summary this paper stated that the optimized protocol improves transmission distance by 25% compared to the standard BB84 protocol, thanks to entanglement swapping and multi-hop quantum repeaters. It also reduces quantum bit error rate by up to 50%, demonstrating its effectiveness in maintaining key fidelity despite noise and channel imperfections. The simulation parameters, such as photon loss rate and detector efficiency, reflect real world quantum communication systems.
Table II highlights the superior performance of the optimized QKD protocol, particularly in terms of transmission distance and error correction capabilities.
QKD P
Protocol | Maximum Distance (km) | QBER at 100 km (%) | Improvement |
---|---|---|---|
100 | 2.5 | - | |
125 | 1.8 | 25% | |
150 | 1.5 | 50% | |
200 | 1.2 | 100% |
Table III demonstrates how the proposed solution compares favorably against established quantum key distribution protocols. The comparison highlights the unique contributions of the optimized QKD protocol, particularly its enhanced security, extended communication distance, and effective error correction.
C
Feature | BB84 [21] | E91 [22] | Decoy State [23] | CV-QKD [24] | MDI-QKD [25] | TF-QKD [26]&[27] | Proposed Solution |
---|---|---|---|---|---|---|---|
Security | Proven secure | Entanglem ent-based | Enhanced security | High security | Device-independent | High security | Enhanced security with advanced techniques |
Key Rate | Moderate | Moderate | High | High | Moderate | High | High, optimized photon utilization |
Distance | Limited | Limited | Extended | Moderate | Extended | Very extended | Extended, leveraging novel methods |
Implementation Complexity | Moderate | High | Moderate | Moderate | High | High | Moderate, easy integration |
Resilience to Attacks | Good | Good | Very good | Good | Excellent | Very good | Excellent, robust error correction |
In this paper an important issue in quantum network communication has been presented which is the optimized QKD protocol. This optimized protocol has focuses on significant practical challenges in quantum communication by extending transmission distance and reducing error rates. The illustrated simulations and theoretical analysis confirm that the effectiveness of the proposed protocol is paving the way for more robust and scalable quantum networks. This paper achieved significant improvements in the performance of QKD protocols by the implementation of entanglement swapping that increased the transmission distance. Application of advanced error correction techniques have improved the transmission distance further. The application of multi hop quantum repeaters resulted in increasing the transmission distance compared to the traditional BB84 protocol. The advanced error correction techniques significantly reduced the QBER resulted in more robust and reliable QKD protocol for long distance communication. The proposed work on (QKD) protocol by the addition of entanglement swapping, advanced error correction techniques and multi hop quantum repeaters addressed critical issues with proper solutions in practical QKD implementations with strong theoretical foundations, robust simulation results and a clear comparison to existing protocols. This work stands out compared to existing solution protocols regarding to many features such as; security, key rate, distance, implementation complexity and resilience to attacks. Future work will involve experimental validation and exploration of further enhancements to protocol efficiency and considering other practical factors such as specific noise sources and more detailed error correction algorithms.