Proceedings of the 4th International Conference on Information and Network Security 2016
DOI: 10.1145/3026724.3026738
|View full text |Cite
|
Sign up to set email alerts
|

Challenges in Quantum Key Distribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…We review prominent QKD protocols, including BB84 and E91. [1][2][3] BB84 encodes a random bit string onto photons in rectilinear or diagonal bases. After transmission, both parties measure the photons in randomly chosen bases and discard bits with different bases to obtain a shared secret key.…”
Section: Related Workmentioning
confidence: 99%
“…We review prominent QKD protocols, including BB84 and E91. [1][2][3] BB84 encodes a random bit string onto photons in rectilinear or diagonal bases. After transmission, both parties measure the photons in randomly chosen bases and discard bits with different bases to obtain a shared secret key.…”
Section: Related Workmentioning
confidence: 99%
“…Security Based on Quantum Mechanics QKD relies on quantum mechanical properties to ensure security; for instance, quantum state collapse during measurement, irreversibility of measurement, the Heisenberg uncertainty principle, the no cloning theorem, and entanglement [5,7]. When a quantum state is measured, the state collapses into one of the possible states and cannot be reversed.…”
Section: Qkd Overviewmentioning
confidence: 99%
“…For quantum entanglement, when two particles are entangled, they are linked in such a way that measuring one particle will instantaneously affect the state of the other particle, regardless of distance. Furthermore, the state of either particle cannot be predicted prior to measurement [7]. Entangled particles follow the property that if the measurement of each particle is performed in the same basis, then their results will be anti-correlated.…”
Section: Qkd Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Quantum cryptography represents one of the most promising schemes for data protection in the quantum era [1,2,3]. Together with post-quantum cryptography techniques which have been selected by NIST [4], Quantum Key Distribution (QKD) is emerging as one of the most secure schemes to deal with quantum computers that are capable of executing the cryptanalytic algorithm for factoring large integer numbers [5].…”
Section: Introductionmentioning
confidence: 99%