
During PNS attack the Eve will unknowingly
block most of the decoy state pulses. However, she
will not block signal states entirely; this causes the
change in yield of decoy states. Thus, leading to
Y
n
̸= Y
signal
n
and Y
n
̸= Y
decoy
n
.
In the case of a beam splitter attack, the Eve in-
troduces a universal loss in the channel, affecting
both signal and decoy states, creating this result Y
n
̸=
Y
signal
n
= Y
decoy
n
. If there is no eavesdropping, then
Y
n
= Y
signal
n
= Y
decoy
n
.
6 CONCLUSION
This literature highlights the limitations of existing
QKD protocols, particularly BB84, in terms of low
key generation rates and vulnerabilities to advanced
attacks. To address these challenges, we proposed
two innovative schemes: Dynamic Quantum Key Dis-
tribution (DQKD) and Enhanced Quantum Key Dis-
tribution (EQKD). The DQKD scheme introduces a
dynamic approach to key exchange, achieving a sig-
nificant improvement in efficiency with a key ex-
change rate of 87.5%, representing a 75% enhance-
ment compared to the traditional BB84 protocol. This
improvement is achieved by dynamically generating
and transmitting the remaining key segments without
the need for basis matching in most transmissions.
EQKD extends the DQKD by incorporating
decoy-state BB84, providing resilience against
photon-number-splitting (PNS) and beam-splitter at-
tacks while maintaining a high key generation rate.
The security of the proposed EQKD was rigorously
analyzed in Section 4, with potential attack scenarios
discussed to highlight the robustness of the scheme.
While EQKD demonstrates strong theoretical perfor-
mance, its practical behavior under simulation and
real-time implementation remains an area for future
exploration.
ACKNOWLEDGMENTS
This work was supported by an Indo-Japanese Joint
Lab Grant and Security of Futuristic Technology
sponsored by MEITY, Government of India.
REFERENCES
Anghel, C. (2009). Base selection and transmission
synchronization algorithm in quantum cryptography.
arXiv preprint arXiv:0909.1315.
Anghel, C. (2011). New quantum cryptographic protocol.
The Annals of “Dunarea de Jos “University of Galati.
Fascicle III, Electrotechnics, Electronics, Automatic
Control, Informatics, 34(2):7–13.
Bennett, C. H. and Brassard, G. (2014). Quantum cryptog-
raphy: Public key distribution and coin tossing. The-
oretical computer science, 560:7–11.
Chong, S.-K. and Hwang, T. (2010). Quantum key agree-
ment protocol based on bb84. Optics Communica-
tions, 283(6):1192–1195.
Diffie, W. and Hellman, M. E. (2022). New directions in
cryptography. In Democratizing Cryptography: The
Work of Whitfield Diffie and Martin Hellman, pages
365–390. ACM.
Du
ˇ
sek, M., Haderka, O., and Hendrych, M. (1999). Gen-
eralized beam-splitting attack in quantum cryptogra-
phy with dim coherent states. Optics communications,
169(1-6):103–108.
Ekert, A. K. (1991). Quantum cryptography based on bell’s
theorem. Physical review letters, 67(6):661.
Hankerson, D. and Menezes, A. (2021). Elliptic curve cryp-
tography. In Encyclopedia of Cryptography, Security
and Privacy, pages 1–2. Springer.
Hassan, M. and Abouelazm, O. (2024). Improving bb84
efficiency with delayed measurement via quantum
memory. arXiv preprint arXiv:2410.21191.
Hwang, W. Y., Koh, I. G., and Han, Y. D. (1998). Quantum
cryptography without public announcement of bases.
Physics Letters A, 244(6):489–494.
Imran, M., Altamimi, A. B., Khan, W., Hussain, S., Al-
saffar, M., et al. (2024). Quantum cryptography for
future networks security: A systematic review. IEEE
Access.
Nwaga, P. C. and Nwagwughiagwu, S. (2024). Explor-
ing the significance of quantum cryptography in future
network security protocols. World J Adv Res Reviews,
24(3):817–833.
Rivest, R. L., Shamir, A., and Adleman, L. (1978). A
method for obtaining digital signatures and public-
key cryptosystems. Communications of the ACM,
21(2):120–126.
Tom, J. J., Anebo, N. P., Onyekwelu, B. A., Wilfred, A., and
Eyo, R. (2023). Quantum computers and algorithms:
a threat to classical cryptographic systems. Int. J. Eng.
Adv. Technol, 12(5):25–38.
Ur Rehman, J., Qaisar, S., Jeong, Y., and Shin, H. (2017).
Security of a control key in quantum key distribution.
Modern Physics Letters B, 31(11):1750119.
Wang, S., Chen, W., Yin, Z.-Q., Li, H.-W., He, D.-Y., Li,
Y.-H., Zhou, Z., Song, X.-T., Li, F.-Y., Wang, D.,
et al. (2014). Field and long-term demonstration of
a wide area quantum key distribution network. Optics
express, 22(18):21739–21756.
Wang, X.-B. (2005). Beating the photon-number-splitting
attack in practical quantum cryptography. Physical
review letters, 94(23):230503.
EDQKD: Enhanced-Dynamic Quantum Key Distributions with Improved Security and Key Rate
591