A Novel Quantum No-Key Protocol for Many Bits Transfer with Error Correction Codes

A R T I C L E I N F O A B S T R A C T Article history: Received: 04 March, 2020 Accepted: 11 April, 2020 Online: 24 April, 2020 In this paper, a novel quantum transmission protocol which are based on the quantum nokey protocol is proposed. First, the quantum no-key protocol is discussed to show its important and its non-efficient on data transmission over quantum channel. Then, we improve it to carry many data bits via transmission. In addition, the error correction code is discussed and emerged into the proposed protocol to secure the transmission over quantum channel noise. Finally, the evaluation of transfer cost is discussed to show the effective of our proposed system.


Introduction
This paper is an extension of work originally presented in 2019 International Conference on Advanced Technologies for Communications (ATC) in Ha-Noi, Viet-Nam [1].
Quantum computation is problem solving and data computation using a system based on quantum mechanics, which is an effort to generalize classical computation. Quantum information systems could be able to transmit data fundamentally securely and solve complex problems better than classical information systems [2]. In 1994, Peter Shor invented a quantum algorithm for factoring integers into prime factors which runs on polynomial time [3]. In addition, in 1996 Lov Grover devised a quantum search algorithm for searching unstructured databases [4]. Hence, quantum algorithms promised big improvements on performance in comparison to classical computation; consequently, many problems have been considered in quantum computation [5]. However, the effects from imperfectly applied quantum gates, decoherence, and other quantum channel noise would affect the practical design of quantum computation. To overcome such problems, quantum error correction code (QECC) based on the theory of classical error correction code, was developed to protect quantum states from noise environment [6]. Since the first QECC was discovered by Shor [7], the method of containing redundancy to circumvent the no-cloning theorem has been popularly used. Therefore, the importance of QECC on practical building of quantum computer is no longer in doubt.
Cryptography is the research of secure communication techniques which allow only sender and intended receivers to view the content of shared messages. With the advantages of quantum mechanism such as entanglement and no-cloning theory, quantum cryptography is an application of quantum mechanics to cryptography. The first quantum cryptography protocol is BB84 which is invented by Dr. C. H. Bennett [8], it is public-key cryptography. In 1980, a novel private key cryptography protocol named Shamir no-key protocol is invented where the sender and receiver do not exchange the key, however the protocol requires the sender and receiver to have their own private keys for encrypting and decrypting the messages with the hard and complex on computation. Since quantum mechanism with no-cloning theorem which can be used to improve no-key protocol; then, in 2002 a quantum cryptography protocol based on Shamir's no-key protocol is considered [9]. In [10], in combination with Hill-cipher algorithm, the quantum no-key protocol was proven to be a scheme for secure direct quantum communications wherein the information is encrypted into a binary string and each bit is exchange between sender and receiver.
The main result of this research is to propose a new quantum no-key protocol which a single quantum state to establish the transfer of many information bits. In addition, the qubit needs to be protected from noise for the correct quantum state exchanged between Sender and Receiver. Hence, we emerge the proposed protocol with quantum error correction codes to establish the secure communication channel which can against the quantum noise, decoherence, and unwanted environments. The organization of this paper is as follows. In Section 2, the basic of quantum computation and quantum error correction codes are reviewed. In Section 3, we first propose the quantum no-key protocol; then, the ASTESJ ISSN: 2415-6698 emerging quantum no-key protocol with error correction code is discussed. Then, the conclusion is presented.

Basic of Quantum Computations
Quantum theory uses qubit to represent information, the quantum systems with two levels such as: two polarization states of photons, two energy levels of atoms, etc. A qubit | ⟩ = |0⟩ + |1⟩ is considered to be found in the both basis states |0⟩ and |1⟩ where the probability value we saw that qubit at state |0⟩ is | | 2 and at state |1⟩ is | | 2 . It is superposition concept of a qubit, which is one of a main property of quantum information since the amount of information which presented in qubits are no limitation [11,12]. A qubit can be displayed in matrix form as, According to norm condition for a qubit on the Bloch sphere space, the complex numbers a and b satisfy the equation | | 2 + | | 2 = 1. A n qubits system is constructed by multiple tensor products of some other qubits, it is given as follows, . Figure 1: Basic quantum gates with matrices presentation The most important thing when we consider a system is the transformation between states among. In quantum information system, quantum states are changed by the quantum gates. Mathematically, quantum gates could be expressed via the matrix representation. The constraints for quantum gates are that they are revertible, it means that the quantum gate which transform the state | ⟩ back to state | ⟩, would satisfy −1 = † . That type of matrix U is called unitary matrix. Figure 1 shows the most important quantum gates with these matrices form. Pauli channel of quantum system consists of four basic elements, namely X, Z, Y, and I (identity matrix). Any operation and errors acting on qubit could be represented as their combination. Hence, we have three types of errors which can affect a qubit, they are bit flip, phase flip, and their combination. In general, the error operators that effect on n qubits have the form: 1 2 ... n E e e e =    where { , , , } i e  I X Y Z .

Basic of Quantum Error Correction Codes
The simplest QECC is three qubits repetition code that can correct only one type error, namely bit flip or phase flip [13]. The QECC can be simulated by quantum circuit model; they are showing in the Figure 2, 3 for three qubits repetition code. The difference between them are on the Clifford gate has been used: X=HZH and Z=HXH.  The explanation for these quantum circuits are described as follows. First, the quantum circuit starts with the initial information, we extend it to the 3-qubits system via helps of ancilla 2 qubits of zeros. After transformation by encoding step, the logical states or encoded qubits are created. Here, two basis states of codewords for 3-qubit are defined as follows, Then, the quantum gates as previous mentioned must to be declared. Here, the quantum gates X, Z, and two new types of CNOT gates are used. The tensor product was used to extend one qubit to many qubits system.
To extend the first full quantum code, Shor code for 9 qubits is created by Shor, which use both bit-flip correction and phase-flip correction and can correct bit-flip, phase-flip, and their combination [14]. To do so, for one qubit is protected against phase-flip we need extend it to codeword of three qubits. Then, each qubits of that three-qubits need to extend to three-qubits to protect against bit-flip error. Hence, the quantum circuit starts with the initial information, we extend it to the 9-qubits via helps of ancilla 8 qubits of zeros, after transformation by encode step, the logical states or encoded qubits are created. Here, two basis states of codewords 9-qubits repetition as well as Using matrices transformation, the states after applying error and decoding can be found. The final states show us the correction state can be recovered the syndrome |S ⟩ tell us which error has applied to logical states. The full quantum circuit for Shor code is given in Figure 4.
Generally, the quantum error correction code can be denoted as [[n,k,d]] where n is length of codeword, k is length of information bits, and d is minimum distance which corresponds to number of error the code can be detected and corrected. The parameter for Shor code at Figure 4 is [9,1,3], and it is the first quantum error correction code. Since the first proposed of Shor code, many novel quantum codes with diverse parameters have been proposed [15,16], they are called quantum stabilizer codes. The most important of quantum stabilizer codes are that they could be constructed by binary formalism, then the quantum circuit model are easy created which points are discussed detailly in [12].

Quantum no-key protocol
Quantum no-key protocol was invented by S. Kak [9], which is an emerging of classical no-key protocol with quantum mechanism. In this system, Sender and Receiver do not share the public key, they have their own private keys. The private key on quantum no-key protocol is an unitary transformation which has following form: The private keys in (6)  We assume that Sender and Receiver want to share the quantum state | ⟩, the protocol is proceeded as Figure 5. The detail of each steps are as follows, 1. Sender randomly choice private encryption key, U( ), apply it to quantum state to get U( )| ⟩. Then, transfer that encrypted state to Receiver.
2. Assume that there is no noise on the channel, Receiver gets the correct recipient from Sender, U( )| ⟩. Receiver also randomly choice its private encryption key, U( ), apply it to current quantum state to get U( )U( )| ⟩ . Then, transfer back encrypted quantum state to Sender. The original quantum no-key protocol just mentions the exchange one bit, 0 or 1, for each round by attached it to quantum state, |0⟩ or |1⟩. In next subsection, we consider the proposed system for multi-bits transfer for each round. Then, it reduces the time of transferring long message.

Proposed quantum no-key protocol for many bits' transfers
We assume that Sender and Receiver wish to exchange the binary string 1 2 … , where each is binary string of length l, that means the total length of binary string Sender and Receiver want to exchange is × . We denote that binary string has the decimal value . The proposed protocol is as follows.
1. Sender and Receiver first exchange the binary string 0 by using the quantum no-key protocol. As analysis on Section 3.1, since 0 has length l, the cost of using quantum no-key protocol for successfully recipient is l. We denote a is the decimal value corresponding to binary string 0 .
2. For binary string 1 , Sender first encodes to the quantum state:  = , where 1 is the decimal value of binary string 1 . The detail of using quantum nokey protocol is shown in Figure 6. We assume that there is no error from quantum channel. Then, Receiver gets correct quantum state  = 1. Since the value of a is known before, Receiver will know exactly 1 via measurement. Finally, Receiver will get binary string 1 .
The cost for exchange binary string 1 between Sender and Receiver is one time using quantum no-key protocol.
3. For remaining binary string 2 , 3 , … , , the same procedure as Step 2 is taken. The cost for successfully recipient is − 1. , if we use original quantum no-key protocol, it is mentioned in [10], we need to use that protocol × times, since the length of this binary string is = × . In contrast, if we use proposed protocol, we need the cost is = − 1 + 1 + = + . This shows that our propose system is suitable to transfer a long binary string.
In this subsection, we still assume that the quantum channel is perfectly. Hence, Sender and Receiver will transfer quantum state successfully to each other. In next Section, we will consider the channel have error and we propose the using of quantum error correction code to reduce that problem.

Proposed quantum no-key protocol with error correction codes
It is proved that in quantum channel quantum state can interact with unwanted environment, which can make bit-flip, phase-flip, or both of them, bit-phase flip. In quantum no-key protocol, we need to transmit quantum state three times, if the error or environment is bad, the result of our system will be go down. Quantum error correction code (QECC) is the solution to solve that problem. The key ideas of QECC is that the quantum state, length k, is extended to have large length, length n > k, where nk redundant qubits we called them parity-check part. The novel QECC is discussed in Section 2.2 where we mention repetition codes for bit-flip and phase flip error, Shor codes for any error, bitflip, phase-flip, or their combination. Figure 7 shows the detail step of using QECC on quantum nokey protocol. The difference between Figure 7 and Figure 6 is that the QECC encoder and QECC decoder are inserted three times, since we have three times of transmission between Sender and Receiver.

Conclusion
In this research, we have proposed the quantum no-key protocol for many bits transfer which is suitable for long binary string transmission. The cost analysis is given in detail to show the effective of proposed system. In addition, the emerging of QECC on that proposed system is promised the way for secure transmission against the unwanted quantum channel.