2014
DOI: 10.9790/0661-162110109
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Key Distribution Protocols: A Review

Abstract: Quantum key distribution (QKD) provides a way for distribution of secure key in at least two parties which they initially share. And there are many protocols for providing a secure key i.e. BB84 protocol, SARG04 protocol, E91 protocol and many more. In this paper all the concerned protocols that share a secret key is explained and comparative study of all protocols shown.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(31 citation statements)
references
References 16 publications
0
31
0
Order By: Relevance
“…We also stress that although there are reported benefits with HD encoding, not all commonly used protocols have been generalized to high dimensions, for example, the SARG04 protocol [63] which is designed for robustness against the photon number splitting attacks or the B92 protocol which is a simpler version of the BB84 protocol [64], hence newer protocols such as the Round-Robin Differential-Phase-Shift are the subject of ongoing development in the context of spatial modes [65]. Importantly, there may be further improvements of our work by implementing our selection of modes with decoy states which has proven invaluable for HD QKD in both free-space and fiber [66,67] and could be of higher value if implemented with heralded sources [57].…”
Section: Discussionmentioning
confidence: 99%
“…We also stress that although there are reported benefits with HD encoding, not all commonly used protocols have been generalized to high dimensions, for example, the SARG04 protocol [63] which is designed for robustness against the photon number splitting attacks or the B92 protocol which is a simpler version of the BB84 protocol [64], hence newer protocols such as the Round-Robin Differential-Phase-Shift are the subject of ongoing development in the context of spatial modes [65]. Importantly, there may be further improvements of our work by implementing our selection of modes with decoy states which has proven invaluable for HD QKD in both free-space and fiber [66,67] and could be of higher value if implemented with heralded sources [57].…”
Section: Discussionmentioning
confidence: 99%
“…This makes it difficult for an attacker to eavesdrop on a communication channel without leaving any trace. In case of eavesdropping the legitimate exchange parties are able to discard the corrupted information as well as to calculate the amount of information that has been intercepted [27]. This property was exploited in BB84.…”
Section: A Quantum Key Distributionmentioning
confidence: 99%
“…It de Steps of the BB84 protocol [7]to exchange the secret key has been described here. Alice and Bob both perform these steps as below:…”
Section: Quantum Crymentioning
confidence: 99%