An optimal swift key generation and distribution for QKD
Annotation
Secured transmission between users is essential for communication system models. Recently, cryptographic schemes were introduced for secured transmission and secret transmission between cloud users. In a cloud environment, there are many security issues that occur among the cloud users such as, account hacking, data breaches, broken authentication, compromised credentials, and so on. Quantum mechanics has been implemented in cryptography that made it efficient for strong security concerns over outsourced data in a cloud environment. Therefore, the present research focuses on providing excellent security for cloud users utilizing a swift key generation model for QKD cryptography. The Quantum Key Distribution (QKD) is an entirely secure scheme known as Cloud QKDP. Initially, a random bit sequence is generated to synchronize the channel. An eavesdropper will not permit to synchronize parameters between them. In this key reconciliation technique, the random bit sequence is concatenated with the photon polarisation state. BB84 protocol is improved by optimizing its bit size using FireFly Optimization (FFO) at the compatibility state, and in the next state, both transmitter and receiver generate a raw key. Once the key is generated, it is then used for the transmission of messages between cloud users. Furthermore, a Python environment is utilized to execute the proposed architecture, and the accuracy rate of the proposed model attained 98 %, and the error rate is 2 %. This proves the performance of the proposed firefly optimization algorithm based swift key generation model for QKD performs better than previous algorithms.
Keywords
Постоянный URL
Articles in current issue
- A study of a silicone film deposited on quartz glass under laser radiation
- Optical composites based on organic polymers and semiconductor pigments
- A new algorithm for the identification of sinusoidal signal frequency with constant parameters
- A study of silicon p-n structures with mono and multifacial photosensitive surfaces
- Detection of yawning in driver behavior based a convolutional neural network
- A Game Theory approach for communication security and safety assurance in cyber-physical systems with Reputation and Trust-based mechanisms
- A study of the influence of human factors on the speed of urban rail transport
- An algorithm for detecting RFID-duplicates
- Reduction of LSB detectors set with definite reliability
- Classification of objects in images with distortions based on a two-stage topological analysis
- Dimensionality reduction of the attributes using fuzzy optimized independent component analysis for a Big Data Intrusion Detection System
- A study of vectorization methods for unstructured text documents in natural language according to their influence on the quality of work of various classifiers
- Recognition the emotional state based on a convolutional neural network
- Intellectualization of personnel development management in high-tech service-oriented companies
- A study of the efficiency of the magnetic compass correction system
- A new analytical model of drain current and small signal parameters for AlGaN-GaN high-electron-mobility transistors
- Imputation and system modeling of acid-base state parameters for different groups of patients
- Construction of movement trajectories for objects based on the Dubins car problem, taking into account constant external influences
- A mathematical model of an epidemic with an arbitrary law of recovery
- Simulation of the pulsed outflow of air and fine powder mixture, partially filling the discharge channel
- Vectorized numerical algorithms for the solution of continuum mechanics problems
- A comparative analysis of computational intelligence algorithms for estimation of LTE channels
- Implementation of a clinical decision support system to improve the medical data quality for hypertensive patients