{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T04:10:17Z","timestamp":1654143017627},"reference-count":32,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,4,1]]},"abstract":"<p>Quantum key distribution (QKD) techniques usually suffer from a gain problem when comparing the final key to the generated pulses of quantum states. This research permutes the sets that RUQB (Abu-ayyash &amp; Ajlouni, 2008) uses in order to increase the gain. The effect of both randomness and permutations are studied; While RUQB technique improves the gain of BB84 QKD by 5.5% it was also shown that the higher the randomness of the initial key the higher the gain that can be achieved, this work concluded that the use of around 7 permutations results in 30% gain recovery in an ideal situations.<\/p>","DOI":"10.4018\/jitwe.2012040103","type":"journal-article","created":{"date-parts":[[2013,2,5]],"date-time":"2013-02-05T22:21:29Z","timestamp":1360102889000},"page":"30-45","source":"Crossref","is-referenced-by-count":0,"title":["Using Permutations to Enhance the Gain of RUQB Technique"],"prefix":"10.4018","volume":"7","author":[{"given":"Abdulla M.","family":"Abu-ayyash","sequence":"first","affiliation":[{"name":"Central Bank of Jordan, Jordan"}]},{"given":"Naim","family":"Ajlouni","sequence":"additional","affiliation":[{"name":"Al-Balqa University, Jordan"}]}],"member":"2432","reference":[{"key":"jitwe.2012040103-0","doi-asserted-by":"crossref","unstructured":"Abu-ayyash, A. M., & Ajlouni, N. (2008). QKD: Recovering unused quantum bits. In Proceedings of the 3rd IEEE International Conference on Information and Communication Technologies, Damascus, Syria (pp. 1-5).","DOI":"10.1109\/ICTTA.2008.4530283"},{"key":"jitwe.2012040103-1","unstructured":"Abu-Ayyash, A. M., & Jabbar, S. (2003). Fraction integer method: Calculating multiplicative inverse. In Proceedings of the 7th World Multi-conference on Systemics, Cybernetics and Informatics, Orlando, FL (pp. 49-53)."},{"key":"jitwe.2012040103-2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.95.010503"},{"key":"jitwe.2012040103-3","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1103\/PhysicsPhysiqueFizika.1.195","article-title":"On the Einstein Podolsky Rosen Paradox.","volume":"1","author":"J. S.Bell","year":"1964","journal-title":"Physics"},{"key":"jitwe.2012040103-4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.68.3121"},{"key":"jitwe.2012040103-5","unstructured":"Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, System, and Signal Processing, Bangalore, India (pp. 175-179)."},{"key":"jitwe.2012040103-6","doi-asserted-by":"publisher","DOI":"10.1007\/BF00191318"},{"key":"jitwe.2012040103-7","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.89.187902"},{"key":"jitwe.2012040103-8","unstructured":"Bouda, J., Pivoluska, M., Plesch, M., & Wilmott, C. (2012). Weak randomness, completely trounces the security of QKD. Retrieved from http:\/\/arxiv.org\/abs\/1206.1287"},{"key":"jitwe.2012040103-9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.92.213601"},{"key":"jitwe.2012040103-10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"jitwe.2012040103-11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRev.47.777"},{"key":"jitwe.2012040103-12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"jitwe.2012040103-13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.107.170404"},{"key":"jitwe.2012040103-14","author":"G.Gilbert","year":"2000","journal-title":"Practical quantum cryptography: A comprehensive analysis (Tech. Rep.)"},{"key":"jitwe.2012040103-15","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/8\/5\/075"},{"key":"jitwe.2012040103-16","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(98)00358-2"},{"key":"jitwe.2012040103-17","doi-asserted-by":"publisher","DOI":"10.1007\/s10702-006-0520-9"},{"key":"jitwe.2012040103-18","doi-asserted-by":"crossref","unstructured":"Kanamori, Y., Yoo, S.-M., & Al-Shurman, M. (2005, March 18-20). A quantum no-key protocol for secure data communication. In Proceedings of the 43rd Annual Southeast Regional Conference, Kennesaw, GA (pp. 92-93).","DOI":"10.1145\/1167253.1167274"},{"key":"jitwe.2012040103-19","doi-asserted-by":"crossref","unstructured":"Kuang, L.-M., & Zhoul, L. (2004). Generation of atom-photon entangled states in atomic Bose-Einstein condensate via electromagnetically induced transparency. Retrieved from http:\/\/arxiv.org\/pdf\/quant-ph\/0402031.pdf","DOI":"10.1103\/PhysRevA.68.043606"},{"key":"jitwe.2012040103-20","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.94.140501"},{"key":"jitwe.2012040103-21","author":"A.Menezes","year":"1997","journal-title":"Handbook of applied cryptography"},{"key":"jitwe.2012040103-22","doi-asserted-by":"publisher","DOI":"10.1038\/nature09008"},{"key":"jitwe.2012040103-23","author":"W.Price","year":"1977","journal-title":"The uncertainty principle and foundations of quantum mechanics: A fifty years survey"},{"key":"jitwe.2012040103-24","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"jitwe.2012040103-25","doi-asserted-by":"publisher","DOI":"10.1002\/prop.200410188"},{"key":"jitwe.2012040103-26","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","article-title":"A mathematical theory of communication.","volume":"27","author":"C. E.Shannon","year":"1948","journal-title":"The Bell System Technical Journal"},{"key":"jitwe.2012040103-27","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","article-title":"Communication theory of secrecy systems.","volume":"28","author":"C. E.Shannon","year":"1949","journal-title":"The Bell System Technical Journal"},{"key":"jitwe.2012040103-28","doi-asserted-by":"publisher","DOI":"10.1364\/OE.15.002873"},{"key":"jitwe.2012040103-29","first-page":"109","article-title":"Cipher printing telegraph systems for secret wire and radio telegraphic communications.","volume":"55","author":"G. S.Vernam","year":"1926","journal-title":"Journal of the IEEE"},{"key":"jitwe.2012040103-30","doi-asserted-by":"publisher","DOI":"10.1145\/1008908.1008920"},{"key":"jitwe.2012040103-31","doi-asserted-by":"crossref","unstructured":"Yang, C.-N., & Kuo, C.-C. (2002). A new efficient quantum key distribution protocol, quantum optics in computing and communications. In Proceedings of the SPIE Conference (Vol. 4917).","DOI":"10.1117\/12.483017"}],"container-title":["International Journal of Information Technology and Web Engineering"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=70384","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T03:54:41Z","timestamp":1654142081000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jitwe.2012040103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,4,1]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jitwe.2012040103","relation":{},"ISSN":["1554-1045","1554-1053"],"issn-type":[{"value":"1554-1045","type":"print"},{"value":"1554-1053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4,1]]}}}