Advanced Technologies of Quantum Key Distribution 2018
DOI: 10.5772/intechopen.74234
|View full text |Cite
|
Sign up to set email alerts
|

Security of Quantum Key Distribution Protocols

Abstract: Quantum key distribution (QKD), another name for quantum cryptography, is the most advanced subfield of quantum information and communication technology (QICT). The first QKD protocol was proposed in 1984, and since then, more protocols have been proposed. It uses quantum mechanics to enable secure exchange of cryptographic keys. In order to have high confidence in the security of the QKD protocols, such protocols must be proven to be secure against any arbitrary attacks. In this chapter, we discuss and demons… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 18 publications
(25 citation statements)
references
References 54 publications
0
19
0
Order By: Relevance
“…2) Quantum key distribution protocols (a) Schemes of QKD Protocol: The two main schemes used to design QKD protocols are Prepare and Measure (P&M) scheme, and Entanglement-Based (EB) scheme [1], [96], [108].…”
Section: A Quantum Bitsmentioning
confidence: 99%
See 3 more Smart Citations
“…2) Quantum key distribution protocols (a) Schemes of QKD Protocol: The two main schemes used to design QKD protocols are Prepare and Measure (P&M) scheme, and Entanglement-Based (EB) scheme [1], [96], [108].…”
Section: A Quantum Bitsmentioning
confidence: 99%
“…(i) Prepare and Measure Scheme: In the P&M scheme, Alice prepares the information in the form of polarized photons and then sends that information to Bob, which is then measured by Bob [96], [108], as shown in Fig. 5.…”
Section: A Quantum Bitsmentioning
confidence: 99%
See 2 more Smart Citations
“…It uses particles, such as photons, to enable two remote parties to produce a shared random secret key known only to them, which can then be used to encrypt and decrypt confidential messages in a classical way. [18][19] Any attempt to intercept the key during creation and distribution will disturb the correlation, alerting users not to use the key thus preempting eavesdropping. The superposition state of a quantum system gets destroyed when exposed to external environment making the state unpredictable, and detects eaves dropper during key distribution process.…”
Section: Fig2 Principle Of Superpositionmentioning
confidence: 99%